General

  • Target

    e7f609df5c0fcdc581a69ed69aa3c4a1.exe

  • Size

    308KB

  • Sample

    230306-ptfzhabf71

  • MD5

    e7f609df5c0fcdc581a69ed69aa3c4a1

  • SHA1

    345ac5a24438b8edb695d32bde79502023e09e31

  • SHA256

    54151922b3a7a1f16e1b10356da10b8293b6ca897fed9d48ffeb3d2eae2685cd

  • SHA512

    76772a9020ad88203d54ed5d792929957145057da17eff9f6b07c292fd76c0aa120b3ea8ab23c6f7a5c9a802422adf906294ace90a53d90eeafb86a92bae008c

  • SSDEEP

    6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1IEP3:i814Xn0Ti8tbJyIQdjrfzuEP3

Malware Config

Targets

    • Target

      e7f609df5c0fcdc581a69ed69aa3c4a1.exe

    • Size

      308KB

    • MD5

      e7f609df5c0fcdc581a69ed69aa3c4a1

    • SHA1

      345ac5a24438b8edb695d32bde79502023e09e31

    • SHA256

      54151922b3a7a1f16e1b10356da10b8293b6ca897fed9d48ffeb3d2eae2685cd

    • SHA512

      76772a9020ad88203d54ed5d792929957145057da17eff9f6b07c292fd76c0aa120b3ea8ab23c6f7a5c9a802422adf906294ace90a53d90eeafb86a92bae008c

    • SSDEEP

      6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1IEP3:i814Xn0Ti8tbJyIQdjrfzuEP3

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks