General

  • Target

    bf48a5cd9169a5826521a8a33b21adee.exe

  • Size

    308KB

  • Sample

    230309-eym89shd6v

  • MD5

    bf48a5cd9169a5826521a8a33b21adee

  • SHA1

    b769421d41836cb6fb1bfc624207ed4f2eac57b5

  • SHA256

    32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab

  • SHA512

    a40ab338563540aaac258b62f29195e56432d137ce4052aee24cec4f01e4c115f116392f7657b9a9dbe2f0b05ff79818520a417ec3608892cbd68c69e9a25a71

  • SSDEEP

    6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1KEP3:i814Xn0Ti8tbJyIQdjrfzQEP3

Malware Config

Targets

    • Target

      bf48a5cd9169a5826521a8a33b21adee.exe

    • Size

      308KB

    • MD5

      bf48a5cd9169a5826521a8a33b21adee

    • SHA1

      b769421d41836cb6fb1bfc624207ed4f2eac57b5

    • SHA256

      32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab

    • SHA512

      a40ab338563540aaac258b62f29195e56432d137ce4052aee24cec4f01e4c115f116392f7657b9a9dbe2f0b05ff79818520a417ec3608892cbd68c69e9a25a71

    • SSDEEP

      6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1KEP3:i814Xn0Ti8tbJyIQdjrfzQEP3

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks