General

  • Target

    c78aa264f209b824c04dc851434fd706a7b3d16c3636a9c8732cf0370aa10428

  • Size

    314KB

  • Sample

    221203-qm9hxagh2z

  • MD5

    db6f4ffb98f13d488016c66fe15c9170

  • SHA1

    14d95f189a0985ddb6f391f5aa780a348f386a47

  • SHA256

    c78aa264f209b824c04dc851434fd706a7b3d16c3636a9c8732cf0370aa10428

  • SHA512

    d05e6e2ecf0dfd84ab4fdf8b86c46764de516d6811e75473e3646eaed8d1addea9d12274a0b82d79c67277c75f1fd939136e371c620c706f43ac85b16031df66

  • SSDEEP

    6144:sFadUykwxoAm35+gTDVh/6C+wyndeeLn+ojK/tJeCleSMY8UPds:sFadUykw+hvyvH9mJeCl+Dqa

Malware Config

Targets

    • Target

      c78aa264f209b824c04dc851434fd706a7b3d16c3636a9c8732cf0370aa10428

    • Size

      314KB

    • MD5

      db6f4ffb98f13d488016c66fe15c9170

    • SHA1

      14d95f189a0985ddb6f391f5aa780a348f386a47

    • SHA256

      c78aa264f209b824c04dc851434fd706a7b3d16c3636a9c8732cf0370aa10428

    • SHA512

      d05e6e2ecf0dfd84ab4fdf8b86c46764de516d6811e75473e3646eaed8d1addea9d12274a0b82d79c67277c75f1fd939136e371c620c706f43ac85b16031df66

    • SSDEEP

      6144:sFadUykwxoAm35+gTDVh/6C+wyndeeLn+ojK/tJeCleSMY8UPds:sFadUykw+hvyvH9mJeCl+Dqa

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks