General

  • Target

    file.exe

  • Size

    21KB

  • Sample

    230607-rwaavacc2w

  • MD5

    3803666407877f6bc945425ce874653d

  • SHA1

    fc824bd0430c2e70e9bfad65a70e78bf059aa82e

  • SHA256

    ee444f87cd33352f2bb9b9bc1a15ff2142613b78553343027f39d5c44128fee3

  • SHA512

    c223764ffb89b13a301904593045a5a5ae7b4eeb0d4f4e21c2a53e072d3d12f3e654f4a750a71fbb9679206c8682dc0664ff167ff142d03adb110e956923bdd2

  • SSDEEP

    384:TAuZSCDIElD/AW6zyeUci3BBcWnYNBa20cDGXwfwqppg6+KnhkMSaTFTD:xlD/22eUcusWY6gZYUTJD

Malware Config

Targets

    • Target

      file.exe

    • Size

      21KB

    • MD5

      3803666407877f6bc945425ce874653d

    • SHA1

      fc824bd0430c2e70e9bfad65a70e78bf059aa82e

    • SHA256

      ee444f87cd33352f2bb9b9bc1a15ff2142613b78553343027f39d5c44128fee3

    • SHA512

      c223764ffb89b13a301904593045a5a5ae7b4eeb0d4f4e21c2a53e072d3d12f3e654f4a750a71fbb9679206c8682dc0664ff167ff142d03adb110e956923bdd2

    • SSDEEP

      384:TAuZSCDIElD/AW6zyeUci3BBcWnYNBa20cDGXwfwqppg6+KnhkMSaTFTD:xlD/22eUcusWY6gZYUTJD

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks