General

  • Target

    e30b325175f133691c90c255fe14800eb9b7df6c6d08b68da3836a33c2b1227e

  • Size

    444KB

  • Sample

    221203-y76lragc7w

  • MD5

    ecd6ea11256bed04787e4f4396269b84

  • SHA1

    d064f9a9b74d60dde168c250fec2f72d5a8f9ff2

  • SHA256

    e30b325175f133691c90c255fe14800eb9b7df6c6d08b68da3836a33c2b1227e

  • SHA512

    1cb8935187168180ddf26115d14136afb2e276575a839d6ca7003539779ea3165d8e4365181337af7797a596ab50731bd5709e542ad72c921e774e31de709e98

  • SSDEEP

    12288:XRo7E6GNPCD9AVd7bNugInPc0oEf0uTSF5OwK9b:XS7EBUD9k9uvnFowPSF5OwK9

Malware Config

Targets

    • Target

      e30b325175f133691c90c255fe14800eb9b7df6c6d08b68da3836a33c2b1227e

    • Size

      444KB

    • MD5

      ecd6ea11256bed04787e4f4396269b84

    • SHA1

      d064f9a9b74d60dde168c250fec2f72d5a8f9ff2

    • SHA256

      e30b325175f133691c90c255fe14800eb9b7df6c6d08b68da3836a33c2b1227e

    • SHA512

      1cb8935187168180ddf26115d14136afb2e276575a839d6ca7003539779ea3165d8e4365181337af7797a596ab50731bd5709e542ad72c921e774e31de709e98

    • SSDEEP

      12288:XRo7E6GNPCD9AVd7bNugInPc0oEf0uTSF5OwK9b:XS7EBUD9k9uvnFowPSF5OwK9

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks