General

  • Target

    a842a92f9f0abfc2c01bd7bf8cd2c3f7d36dda36d394c4b8c6624096cc496011

  • Size

    880KB

  • Sample

    230322-kpjsdafh29

  • MD5

    889307a2c7f290ebefc16cb7e89c4a1a

  • SHA1

    719d6bb31b35240de46502cc557b89b0ccf2731f

  • SHA256

    a842a92f9f0abfc2c01bd7bf8cd2c3f7d36dda36d394c4b8c6624096cc496011

  • SHA512

    c18acaed7da55feea171c0a0bc7db23e6e96ad4bfce213d158311abdac8cfd0340df899e01ac3bcae37e67168af0f35b34c8ddbcbdfde44fa86477be52ab9e55

  • SSDEEP

    6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7FZ1d43wUmDm:nz/9ja2ieFYp5R+I7zY

Malware Config

Targets

    • Target

      a842a92f9f0abfc2c01bd7bf8cd2c3f7d36dda36d394c4b8c6624096cc496011

    • Size

      880KB

    • MD5

      889307a2c7f290ebefc16cb7e89c4a1a

    • SHA1

      719d6bb31b35240de46502cc557b89b0ccf2731f

    • SHA256

      a842a92f9f0abfc2c01bd7bf8cd2c3f7d36dda36d394c4b8c6624096cc496011

    • SHA512

      c18acaed7da55feea171c0a0bc7db23e6e96ad4bfce213d158311abdac8cfd0340df899e01ac3bcae37e67168af0f35b34c8ddbcbdfde44fa86477be52ab9e55

    • SSDEEP

      6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7FZ1d43wUmDm:nz/9ja2ieFYp5R+I7zY

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks