General

  • Target

    file.exe

  • Size

    573KB

  • Sample

    230426-kjq99sab3z

  • MD5

    8302f326fa05ce8879678b296eae4245

  • SHA1

    a6613078ed05e9803bfcf54705d394ad66dfb4b5

  • SHA256

    e5b432be651f1c2e2d10923fa2e07f21d3ccbb98a1238d04a8b8a6f801b19fae

  • SHA512

    75a3c5428584e53c76a4cb6f8b10e77450bcc2723b8636b178ea5f29f2b77eb8705209328eac9c6f2c513dcc6ea3c5129ce204bbeff43db7c04cac3d9fab731a

  • SSDEEP

    12288:NrjUd3f1dZsbBOnKyElys4rFn5tiRuH3m9qubvwJCn:NrwdPVsWKyor455URuH3o5bvwJCn

Malware Config

Targets

    • Target

      file.exe

    • Size

      573KB

    • MD5

      8302f326fa05ce8879678b296eae4245

    • SHA1

      a6613078ed05e9803bfcf54705d394ad66dfb4b5

    • SHA256

      e5b432be651f1c2e2d10923fa2e07f21d3ccbb98a1238d04a8b8a6f801b19fae

    • SHA512

      75a3c5428584e53c76a4cb6f8b10e77450bcc2723b8636b178ea5f29f2b77eb8705209328eac9c6f2c513dcc6ea3c5129ce204bbeff43db7c04cac3d9fab731a

    • SSDEEP

      12288:NrjUd3f1dZsbBOnKyElys4rFn5tiRuH3m9qubvwJCn:NrwdPVsWKyor455URuH3o5bvwJCn

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks