General

  • Target

    MPSNTQWR90002023.IMG

  • Size

    1.2MB

  • Sample

    230217-jqf77sed39

  • MD5

    91c8c296f1645205ce17a409d90e608b

  • SHA1

    b0379fb83ac5f1b4c0c8176dd508543a849c5b8d

  • SHA256

    c4def5aff5d18a806859a71e2a48f8f69ec3e3ea339673e051d770e8c38c1919

  • SHA512

    a26edfa6b0edbc463e8442d52afd4ee4fb3c2dcbbe5a87a11ec44cd2216440fa96c2cd04ce442fb0435425bc8e5d5ed98f7003c7077b9830879634deb34fe366

  • SSDEEP

    6144:6yIB9qSljbH5svbNAvVgVX1U8faOsrX6Oc/XR6jbUaEgKLC2K:c9BOvy4UqaOsrE/BObGT

Malware Config

Targets

    • Target

      MPSNTQWR90002023.com

    • Size

      338KB

    • MD5

      2b97bba2c3586f53239de1202dd5a589

    • SHA1

      18fd9d9b2992399b87b23ab66b711301ba38f693

    • SHA256

      91c2e0730c8d4f84cd8095c2b21ab42046d6248ca1b068afc02cf41769b5dfda

    • SHA512

      be8d4afcfeb79d4fc93577dec0bd174864da91b23ffdfcd04ed2ba494a04507f809ae94f90b43b040cad5e6a84f0bc1b522edb9b18aeaf1db73d6992928d53fe

    • SSDEEP

      6144:/yIB9qSljbH5svbNAvVgVX1U8faOsrX6Oc/XR6jbUaEgKLC2K4:79BOvy4UqaOsrE/BObGT5

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks