General

  • Target

    file.exe

  • Size

    42KB

  • Sample

    230609-ksqebscd8t

  • MD5

    fea015b6e2f3c5dfed94fbd3935fb365

  • SHA1

    0ab3ccbef0de345f6fc3edb3e0320f77ddfa4255

  • SHA256

    fed161ae617fd483308f66110a4b43594e39602c7ba11dbb7fb6e79fd6f4fbbf

  • SHA512

    f237b3fcf5292271fd0801db18a5d94215d405265999d68e7f071d243b02876f49e8b94150e70ef5a17e5fe14d9c3d9faee8f28efd58bcd918e1e8d9e6dbdcf1

  • SSDEEP

    768:JOIW7du3neRXZHxjim11Nvw4/bTTay0CE5qb4rafFf9:JOdu3nIPR11R/bTTarefFf9

Malware Config

Targets

    • Target

      file.exe

    • Size

      42KB

    • MD5

      fea015b6e2f3c5dfed94fbd3935fb365

    • SHA1

      0ab3ccbef0de345f6fc3edb3e0320f77ddfa4255

    • SHA256

      fed161ae617fd483308f66110a4b43594e39602c7ba11dbb7fb6e79fd6f4fbbf

    • SHA512

      f237b3fcf5292271fd0801db18a5d94215d405265999d68e7f071d243b02876f49e8b94150e70ef5a17e5fe14d9c3d9faee8f28efd58bcd918e1e8d9e6dbdcf1

    • SSDEEP

      768:JOIW7du3neRXZHxjim11Nvw4/bTTay0CE5qb4rafFf9:JOdu3nIPR11R/bTTarefFf9

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks