General

  • Target

    b6ff94943387d2c87a943f0467524529892eaa4a3195312e6186da7beb4afa5e

  • Size

    1.4MB

  • Sample

    230121-b64pfaac99

  • MD5

    4f574f096b3f398ba57f5ee6c4cdd359

  • SHA1

    eeec23e1f1108b237cf1e0b06518fb831d1bee8c

  • SHA256

    b6ff94943387d2c87a943f0467524529892eaa4a3195312e6186da7beb4afa5e

  • SHA512

    cdea21588e3a8ee2781255f8a5268e8678adb24536ecf489ddeb3dff6cefa91bc84cd349f3c3aab8019e59506022269ea94f124f4d1085bb39918a2adcb5c066

  • SSDEEP

    24576:KGgUpn7BeYfAjXxo8wWvH5aO5iBrFYPYt79Q:KGVjIjaWxaOCrFl6

Malware Config

Targets

    • Target

      b6ff94943387d2c87a943f0467524529892eaa4a3195312e6186da7beb4afa5e

    • Size

      1.4MB

    • MD5

      4f574f096b3f398ba57f5ee6c4cdd359

    • SHA1

      eeec23e1f1108b237cf1e0b06518fb831d1bee8c

    • SHA256

      b6ff94943387d2c87a943f0467524529892eaa4a3195312e6186da7beb4afa5e

    • SHA512

      cdea21588e3a8ee2781255f8a5268e8678adb24536ecf489ddeb3dff6cefa91bc84cd349f3c3aab8019e59506022269ea94f124f4d1085bb39918a2adcb5c066

    • SSDEEP

      24576:KGgUpn7BeYfAjXxo8wWvH5aO5iBrFYPYt79Q:KGVjIjaWxaOCrFl6

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks