General

  • Target

    fee1d36af03a162f70a627c7cd3efa55b0557530d7eefbe8c72026f48b904595

  • Size

    2.0MB

  • Sample

    230112-jrpwqsfe32

  • MD5

    1184c28ad980d08f820085fa46018b9f

  • SHA1

    4cfd74333320f9aa38d5a77eb16ce3da10729c9a

  • SHA256

    fee1d36af03a162f70a627c7cd3efa55b0557530d7eefbe8c72026f48b904595

  • SHA512

    8ebe95c7d32ceb7986617d4a069cc73540fd32049cd3c10cd9c1aac5a1993814ec43eece61195d7de1e4a2aad35cfab5959e75ad8551de22ad904eed3811e1b9

  • SSDEEP

    49152:0KlYcfLLLIWpjLHUmACAkczzqcBrywk0dTTBj:0KWcfrXxH1AVDBmwfdT9

Score
10/10

Malware Config

Targets

    • Target

      fee1d36af03a162f70a627c7cd3efa55b0557530d7eefbe8c72026f48b904595

    • Size

      2.0MB

    • MD5

      1184c28ad980d08f820085fa46018b9f

    • SHA1

      4cfd74333320f9aa38d5a77eb16ce3da10729c9a

    • SHA256

      fee1d36af03a162f70a627c7cd3efa55b0557530d7eefbe8c72026f48b904595

    • SHA512

      8ebe95c7d32ceb7986617d4a069cc73540fd32049cd3c10cd9c1aac5a1993814ec43eece61195d7de1e4a2aad35cfab5959e75ad8551de22ad904eed3811e1b9

    • SSDEEP

      49152:0KlYcfLLLIWpjLHUmACAkczzqcBrywk0dTTBj:0KWcfrXxH1AVDBmwfdT9

    Score
    10/10
    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks