General

  • Target

    file.exe

  • Size

    880KB

  • Sample

    230321-al64dsga27

  • MD5

    7e9d6867dfd8711952376aa02aaeb453

  • SHA1

    a90cf5c5d9079716dde8b0c2be20dbd6fb0fbc3d

  • SHA256

    a759dfe145751752776c392ad2f5dffd1fa7f4e77e3f5daeeb2258baa2271262

  • SHA512

    94a0e3160fed3a977d631ee1b2c9c9cc2235fedab0ad7e1231ae837ccfbacc04d3a92e9a367dfe299bdf998bbb926667f84b013263acb41bf0debf23fed61674

  • SSDEEP

    6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F/1d43wUmDm:nz/9ja2ieFYp5R+I7VY

Malware Config

Targets

    • Target

      file.exe

    • Size

      880KB

    • MD5

      7e9d6867dfd8711952376aa02aaeb453

    • SHA1

      a90cf5c5d9079716dde8b0c2be20dbd6fb0fbc3d

    • SHA256

      a759dfe145751752776c392ad2f5dffd1fa7f4e77e3f5daeeb2258baa2271262

    • SHA512

      94a0e3160fed3a977d631ee1b2c9c9cc2235fedab0ad7e1231ae837ccfbacc04d3a92e9a367dfe299bdf998bbb926667f84b013263acb41bf0debf23fed61674

    • SSDEEP

      6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F/1d43wUmDm:nz/9ja2ieFYp5R+I7VY

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks