General

  • Target

    d5e7b6fe3bb68f1da7ec111231292f02.exe

  • Size

    308KB

  • Sample

    230306-nqk9dacb27

  • MD5

    d5e7b6fe3bb68f1da7ec111231292f02

  • SHA1

    1e71cbeb2caba1f955219f916fce7d13c05436b6

  • SHA256

    b261a7995c16bc433bd714b2830e519c40c3b8bd60ad6a6239ce27e672dc6650

  • SHA512

    f9d71917272958ef2cdae91b812d7aca62ee1d0993957ae734aaa7cbdcc88792cb52614515aa8f94c176ac56ac4f89bae902c142c5e187584fe25e7a335ac2c2

  • SSDEEP

    6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1dEP3:i814Xn0Ti8tbJyIQdjrfzPEP3

Malware Config

Targets

    • Target

      d5e7b6fe3bb68f1da7ec111231292f02.exe

    • Size

      308KB

    • MD5

      d5e7b6fe3bb68f1da7ec111231292f02

    • SHA1

      1e71cbeb2caba1f955219f916fce7d13c05436b6

    • SHA256

      b261a7995c16bc433bd714b2830e519c40c3b8bd60ad6a6239ce27e672dc6650

    • SHA512

      f9d71917272958ef2cdae91b812d7aca62ee1d0993957ae734aaa7cbdcc88792cb52614515aa8f94c176ac56ac4f89bae902c142c5e187584fe25e7a335ac2c2

    • SSDEEP

      6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1dEP3:i814Xn0Ti8tbJyIQdjrfzPEP3

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks