General

  • Target

    f7682f7dedc2a1ae89e8fef584aeafc44f7742919deb6b839d58fd800fceb16d

  • Size

    308KB

  • Sample

    230306-ggz8lsah49

  • MD5

    9ee78f83577be2793a35ee683ccee5fc

  • SHA1

    8baed5c17e0e45219946bcdafa6f0eea9d33c0d8

  • SHA256

    f7682f7dedc2a1ae89e8fef584aeafc44f7742919deb6b839d58fd800fceb16d

  • SHA512

    d521231236bdc0bdeb1c2b4ca66281e0b82c126b36dd3e45b6c4927ca4f2485f4eadd6db6831fcb00a0fb271ee1ea42d3d8cba918d6e080924e0f45a9cff1576

  • SSDEEP

    6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1fEP3:i814Xn0Ti8tbJyIQdjrfzNEP3

Malware Config

Targets

    • Target

      f7682f7dedc2a1ae89e8fef584aeafc44f7742919deb6b839d58fd800fceb16d

    • Size

      308KB

    • MD5

      9ee78f83577be2793a35ee683ccee5fc

    • SHA1

      8baed5c17e0e45219946bcdafa6f0eea9d33c0d8

    • SHA256

      f7682f7dedc2a1ae89e8fef584aeafc44f7742919deb6b839d58fd800fceb16d

    • SHA512

      d521231236bdc0bdeb1c2b4ca66281e0b82c126b36dd3e45b6c4927ca4f2485f4eadd6db6831fcb00a0fb271ee1ea42d3d8cba918d6e080924e0f45a9cff1576

    • SSDEEP

      6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1fEP3:i814Xn0Ti8tbJyIQdjrfzNEP3

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks