General

  • Target

    65a2b3cf112d50e941051116e68b736239d521bf7611e143ae1c83f93716f6f5

  • Size

    695KB

  • Sample

    230119-xqs4naha24

  • MD5

    7864b6bcbeada443698afed738824deb

  • SHA1

    93bdd68b06c1372fb982f2a19ca69b374254f692

  • SHA256

    65a2b3cf112d50e941051116e68b736239d521bf7611e143ae1c83f93716f6f5

  • SHA512

    7281ad3c36f3f18a7bdc8574002512e759853d3d229871182ef1cfddd8eb5d49f0f5910dee1fba29c509bb462dadc6b828283a5c9c05447d517578b15bf4608b

  • SSDEEP

    12288:yv1DJyQoHJF62kVKFhfFpNPJVLjl2IDE+3w/Ksq/KsN/Ks:yJUcVKFhfFPJtl2n+Qit

Malware Config

Targets

    • Target

      65a2b3cf112d50e941051116e68b736239d521bf7611e143ae1c83f93716f6f5

    • Size

      695KB

    • MD5

      7864b6bcbeada443698afed738824deb

    • SHA1

      93bdd68b06c1372fb982f2a19ca69b374254f692

    • SHA256

      65a2b3cf112d50e941051116e68b736239d521bf7611e143ae1c83f93716f6f5

    • SHA512

      7281ad3c36f3f18a7bdc8574002512e759853d3d229871182ef1cfddd8eb5d49f0f5910dee1fba29c509bb462dadc6b828283a5c9c05447d517578b15bf4608b

    • SSDEEP

      12288:yv1DJyQoHJF62kVKFhfFpNPJVLjl2IDE+3w/Ksq/KsN/Ks:yJUcVKFhfFPJtl2n+Qit

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks