General

  • Target

    964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.zip

  • Size

    5.9MB

  • Sample

    230114-wzkm7sbf58

  • MD5

    3b556c0f6f1d44395c17f70567e78c47

  • SHA1

    fbe5774fc4f3eaecf8337b26f43b2d95880489cd

  • SHA256

    4a48666773f2f011d86768b3cbabe56f9683a4a9243f510d9ed76b6a12addb59

  • SHA512

    b4bada1fe9ff6c7a9671e1d47220f7d2ca87e630bdfa96fa6a97fbcfac1480da807e65a72c004f74d506e674e8baeda4a97452c2338d115ae5de6dedfc721906

  • SSDEEP

    98304:ZP0uCwITUXu/ArmWHGKcjEgKVdYuXKLSfLK2MjGLXyRMkI4HiMlQSiBm:6RAXxjHGKcjEgKV8LSfLK2yszkP

Score
8/10

Malware Config

Targets

    • Target

      964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.msi

    • Size

      6.6MB

    • MD5

      0bd958b0c88d3614f563ea50f97c2121

    • SHA1

      d8a86ab60b4807600f227a744c814baa03eac396

    • SHA256

      964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e

    • SHA512

      01853db3bc1ce3a3827c8473ea15cc24321dc3b114b3301d3932a3c49cf6d46e5455cf452380c2c8392b9debf825c3a1647ca9116b76d1ee343b7d3baa9cb91f

    • SSDEEP

      196608:9N92ovsFoCcBkDr1vAH/MjVPJtvuelsDDWWe:9N92+Mo44kNznaWWe

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks