General

  • Target

    bc936222af5841e0e16687624cfedf2743c9285119fe0c97786f6ae174f825c5

  • Size

    328KB

  • Sample

    230310-hkcr6aca48

  • MD5

    243bdb269b59f604ad9bc109758aeb2c

  • SHA1

    a7bb9fa52e09477f654cb7db70411e072224e51c

  • SHA256

    bc936222af5841e0e16687624cfedf2743c9285119fe0c97786f6ae174f825c5

  • SHA512

    36d35dfbe6b516be8f2f2f9dbc0770e727750553cae5db3a30cba40a71c1c777fb4b89684afbdf166869acce6b2b314b6b0dd6c4a954aae1d9d1fea359ee9034

  • SSDEEP

    6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33sEPT:evjas8uHEAAtvBpkJEPT

Malware Config

Targets

    • Target

      bc936222af5841e0e16687624cfedf2743c9285119fe0c97786f6ae174f825c5

    • Size

      328KB

    • MD5

      243bdb269b59f604ad9bc109758aeb2c

    • SHA1

      a7bb9fa52e09477f654cb7db70411e072224e51c

    • SHA256

      bc936222af5841e0e16687624cfedf2743c9285119fe0c97786f6ae174f825c5

    • SHA512

      36d35dfbe6b516be8f2f2f9dbc0770e727750553cae5db3a30cba40a71c1c777fb4b89684afbdf166869acce6b2b314b6b0dd6c4a954aae1d9d1fea359ee9034

    • SSDEEP

      6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33sEPT:evjas8uHEAAtvBpkJEPT

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks