General

  • Target

    8fa50a46b9cd3efb2c5ff64ea4d6e1648abc217a4241eb873dddfd64eafe1d3a

  • Size

    195KB

  • Sample

    221206-xm1dkagg4w

  • MD5

    621087965493c431fd8730fb74358a1b

  • SHA1

    a7906e47804e205eeb7090ec00569e27596add8f

  • SHA256

    8fa50a46b9cd3efb2c5ff64ea4d6e1648abc217a4241eb873dddfd64eafe1d3a

  • SHA512

    8ee28488c28443be06f84ef2ff17b7752a5a69a96971fd1627cf5a8545c63b16c027396345da168d617a3c0e032062794593d2ae4779dc6dbd52d0a90ad41a31

  • SSDEEP

    6144:QN2NQvB5F6DGBpo2pOEF9Givj7VPZA0iHReeBThx:IGQLF6DGBpo2UfIPliYeBThx

Malware Config

Targets

    • Target

      8fa50a46b9cd3efb2c5ff64ea4d6e1648abc217a4241eb873dddfd64eafe1d3a

    • Size

      195KB

    • MD5

      621087965493c431fd8730fb74358a1b

    • SHA1

      a7906e47804e205eeb7090ec00569e27596add8f

    • SHA256

      8fa50a46b9cd3efb2c5ff64ea4d6e1648abc217a4241eb873dddfd64eafe1d3a

    • SHA512

      8ee28488c28443be06f84ef2ff17b7752a5a69a96971fd1627cf5a8545c63b16c027396345da168d617a3c0e032062794593d2ae4779dc6dbd52d0a90ad41a31

    • SSDEEP

      6144:QN2NQvB5F6DGBpo2pOEF9Givj7VPZA0iHReeBThx:IGQLF6DGBpo2UfIPliYeBThx

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks