General

  • Target

    Crack.exe

  • Size

    880KB

  • Sample

    230325-swzq6sdc77

  • MD5

    e299ac0fd27e67160225400bdd27366f

  • SHA1

    65011c91a7fbae82f4a6f3c81ff396b96f84359c

  • SHA256

    cb2758f0f595a4fd22411088590a3bb671834342e73b86c4ef9d863d28eec8ed

  • SHA512

    f4f4e4554b4391b50977948dbc7c1eb2c837fdb2f321665e406af90dba9ba4b2c4a851406ca13cb321c363602f24b963633c5153329f5e292f4a076e2cb98b46

  • SSDEEP

    6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F71d43wUmDm:nz/9ja2ieFYp5R+I7BY

Malware Config

Targets

    • Target

      Crack.exe

    • Size

      880KB

    • MD5

      e299ac0fd27e67160225400bdd27366f

    • SHA1

      65011c91a7fbae82f4a6f3c81ff396b96f84359c

    • SHA256

      cb2758f0f595a4fd22411088590a3bb671834342e73b86c4ef9d863d28eec8ed

    • SHA512

      f4f4e4554b4391b50977948dbc7c1eb2c837fdb2f321665e406af90dba9ba4b2c4a851406ca13cb321c363602f24b963633c5153329f5e292f4a076e2cb98b46

    • SSDEEP

      6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F71d43wUmDm:nz/9ja2ieFYp5R+I7BY

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks