General

  • Target

    ultdata-android.exe

  • Size

    2.1MB

  • Sample

    230206-3epjzsgd32

  • MD5

    fdb3d5a897b8f1d0330b1486cf14a7a0

  • SHA1

    4e513d885a325ec098bf24c6c8cb840f5c2e0fe7

  • SHA256

    9177f4ea7d98bf6d047fe3a871fa7ce78432bb8644aa7b0d4f94c08313e27956

  • SHA512

    3cc9cc1cf35c60a046a55614215b12fbb01ddf06fd50db7d39f683d166ac14901b9fc33536e6a6a72db5b5e314dacf35a1b5389bdbf315b1c7b89b40dd7af07a

  • SSDEEP

    49152:RBrmqX5EIZ1h+Fyamj4NIyH1HWS4cxX8Q/UEOZaAMnQ:RA+EG7tZDS408QMaAD

Malware Config

Targets

    • Target

      ultdata-android.exe

    • Size

      2.1MB

    • MD5

      fdb3d5a897b8f1d0330b1486cf14a7a0

    • SHA1

      4e513d885a325ec098bf24c6c8cb840f5c2e0fe7

    • SHA256

      9177f4ea7d98bf6d047fe3a871fa7ce78432bb8644aa7b0d4f94c08313e27956

    • SHA512

      3cc9cc1cf35c60a046a55614215b12fbb01ddf06fd50db7d39f683d166ac14901b9fc33536e6a6a72db5b5e314dacf35a1b5389bdbf315b1c7b89b40dd7af07a

    • SSDEEP

      49152:RBrmqX5EIZ1h+Fyamj4NIyH1HWS4cxX8Q/UEOZaAMnQ:RA+EG7tZDS408QMaAD

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks