General

  • Target

    dc56678d1c8b6da91876f55faeaad1a3eae39f6d46d283500015678cf7e6f4be

  • Size

    20KB

  • Sample

    221205-z133qagc77

  • MD5

    0df11fa0be3319c979f23caaef65bf81

  • SHA1

    4e189ec73b3df759485f1dc1da12aa68d0fe31c4

  • SHA256

    dc56678d1c8b6da91876f55faeaad1a3eae39f6d46d283500015678cf7e6f4be

  • SHA512

    28f9d50512cb2cd4d009d576b617c86f2c55f108c6f258b74acf3b21d716c0164ff3aa51850f1f2663ed21470e2b82d8dc2563b96b18f4bbc4a3da33da1b4baf

  • SSDEEP

    384:K7IHHwGaL0HFQfh7Ej+dmV28nsCVE4ciaKWvBc2p1s57bbqciaZf:QIHRxQJ75mV28sCen2WZcCg7gcf

Malware Config

Targets

    • Target

      dc56678d1c8b6da91876f55faeaad1a3eae39f6d46d283500015678cf7e6f4be

    • Size

      20KB

    • MD5

      0df11fa0be3319c979f23caaef65bf81

    • SHA1

      4e189ec73b3df759485f1dc1da12aa68d0fe31c4

    • SHA256

      dc56678d1c8b6da91876f55faeaad1a3eae39f6d46d283500015678cf7e6f4be

    • SHA512

      28f9d50512cb2cd4d009d576b617c86f2c55f108c6f258b74acf3b21d716c0164ff3aa51850f1f2663ed21470e2b82d8dc2563b96b18f4bbc4a3da33da1b4baf

    • SSDEEP

      384:K7IHHwGaL0HFQfh7Ej+dmV28nsCVE4ciaKWvBc2p1s57bbqciaZf:QIHRxQJ75mV28sCen2WZcCg7gcf

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks