General

  • Target

    5a2b7e55e12b6be111413e81cbc829d8.bin

  • Size

    528KB

  • Sample

    230123-r1x8gafc7t

  • MD5

    e9d66adc73fd3fa96602727cefc0acfc

  • SHA1

    405984cacb6af9cb5f81164d8253d227579f7506

  • SHA256

    f6b889372577c64227b230609e8404d4629288ec1ae4df7376d6005361d3d69a

  • SHA512

    f9e95b1480d8974a0c36cb6382259ba98b8928b92acd393c4d4e11c0ac3bd981ab969a67563e295e8a459548f39f309f413b47c716a9a66c73f1878c37c53dbc

  • SSDEEP

    12288:2NSKxFR6CH9ifXFy1f/VIo5o9caFjo34ATCF0GyP:2NSGeYidMfdfEjMIATQtyP

Malware Config

Targets

    • Target

      357454521efaa0849a2ee13d2f3531082ac56d110a10b137654d5777cf724d51.exe

    • Size

      614KB

    • MD5

      5a2b7e55e12b6be111413e81cbc829d8

    • SHA1

      feee5eea1ba33a666fb61f876c80230d97ba8b47

    • SHA256

      357454521efaa0849a2ee13d2f3531082ac56d110a10b137654d5777cf724d51

    • SHA512

      9e1c78e83a0c4342cf4f560eb4c81c3a7ca52f360adf594ddc654f9a1f56837b6339da3c2d74a4b525865832d937d181b8f13137c1870b05b87dcf4cfce8fc20

    • SSDEEP

      12288:6rxXmSBr7wHt5c/yq1HcmZCqsyKEJgnzAS6n2jj:6JYvcRd1ZC1XE4MSHf

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks