General

  • Target

    554d1bf959ca113c28305ba0a4368717560b5bee8f825c05b24dc53481916e8b

  • Size

    160KB

  • Sample

    221205-x4ajgaca3s

  • MD5

    45a6db02a04d47f30858c0a52e6afd30

  • SHA1

    ebcd2eda5a02b8804541cabc9a57faedd09e1ddc

  • SHA256

    554d1bf959ca113c28305ba0a4368717560b5bee8f825c05b24dc53481916e8b

  • SHA512

    32c6584409fb7e13906ba1c12e48a124e6ea0441a06a43f8771c2644252f8ddcb6673cddcd7f99a3bc4176f88b88dd35e3bd987b9c21688f86fff1338287a841

  • SSDEEP

    1536:3+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:3xbkuVbvLn7Uj3

Malware Config

Targets

    • Target

      554d1bf959ca113c28305ba0a4368717560b5bee8f825c05b24dc53481916e8b

    • Size

      160KB

    • MD5

      45a6db02a04d47f30858c0a52e6afd30

    • SHA1

      ebcd2eda5a02b8804541cabc9a57faedd09e1ddc

    • SHA256

      554d1bf959ca113c28305ba0a4368717560b5bee8f825c05b24dc53481916e8b

    • SHA512

      32c6584409fb7e13906ba1c12e48a124e6ea0441a06a43f8771c2644252f8ddcb6673cddcd7f99a3bc4176f88b88dd35e3bd987b9c21688f86fff1338287a841

    • SSDEEP

      1536:3+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:3xbkuVbvLn7Uj3

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks