General

  • Target

    daf761fb9aaa34a9c2120003694d88a3.bin

  • Size

    14KB

  • Sample

    230608-cejevsaf82

  • MD5

    c45802af0bfab17c1a190e5f3779dffe

  • SHA1

    0767e38d797cc91c1f340666b3a093b3e2806438

  • SHA256

    31fd845f997c38c66932285765e21530e6df360679ac8efd25345c36d202c23b

  • SHA512

    7978c64f4eda89387407735d4f4763b091c638c1e592374bd9b18149fb0ea3b558fd4582f02028c98da03a0fa1d475332e0425b9ea89f3e08a0593324c9ed15b

  • SSDEEP

    384:hVYpCqX0JUkBKpRx9TPpXCRoySaEBf4MvG4i:34XLkBKTx9TxpySt94Gi

Malware Config

Targets

    • Target

      18d4850a10812f3b4d8631939d469b41c1d344a7fa9205acc31b265d0600291b.exe

    • Size

      30KB

    • MD5

      daf761fb9aaa34a9c2120003694d88a3

    • SHA1

      47fd2695b6da26f6444799d442662b982d70f783

    • SHA256

      18d4850a10812f3b4d8631939d469b41c1d344a7fa9205acc31b265d0600291b

    • SHA512

      1ddf3c0b4dcbb4103d24b6a5bb3308dff706c9d9277d411be3f9356e9040e67b04c0c02c9c927ba60c5723a50d746287de34cff5545003a0aed3596ec13fd7b2

    • SSDEEP

      768:uwVMApolbUGPPMdwdunhdH15FIU/ogyejq:bVLoljn8nhj5FF1jq

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks