General

  • Target

    file.exe

  • Size

    1.3MB

  • Sample

    230106-n7116abe91

  • MD5

    8cc5e4b790ca6dbd8042b00ef47343b8

  • SHA1

    977960d16c18c0e2944d7ac6e9641f9a85ff5fe4

  • SHA256

    53af5fe3b8955c9975a05b1607e5dd7fafdc4eb5b23c44b04e40e073f9ac7f99

  • SHA512

    e7d3ef3fd25721e966e800ab618cfe224e4edbb2d9f0103da45709097d41879692791705aa6c457ed3e30381686b8b302862ef17074f6a3ee7ea6ddb13de8570

  • SSDEEP

    12288:U8nE71zd/89j+/UgZZMzuab9HO4rdpWz67pc8TO3/iCO8hsiS0vOUw0ZT9avvqpt:I1dLuua5BLzDgqYLqoa9wascTwwTb3mD

Malware Config

Targets

    • Target

      file.exe

    • Size

      1.3MB

    • MD5

      8cc5e4b790ca6dbd8042b00ef47343b8

    • SHA1

      977960d16c18c0e2944d7ac6e9641f9a85ff5fe4

    • SHA256

      53af5fe3b8955c9975a05b1607e5dd7fafdc4eb5b23c44b04e40e073f9ac7f99

    • SHA512

      e7d3ef3fd25721e966e800ab618cfe224e4edbb2d9f0103da45709097d41879692791705aa6c457ed3e30381686b8b302862ef17074f6a3ee7ea6ddb13de8570

    • SSDEEP

      12288:U8nE71zd/89j+/UgZZMzuab9HO4rdpWz67pc8TO3/iCO8hsiS0vOUw0ZT9avvqpt:I1dLuua5BLzDgqYLqoa9wascTwwTb3mD

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks