General

  • Target

    file.exe

  • Size

    50KB

  • Sample

    230609-nlkr2scg7t

  • MD5

    9d846bb9fbd2e4ce0a2344b02d535e9c

  • SHA1

    91bb1d20302d740b733d155bd42556038b900380

  • SHA256

    ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07

  • SHA512

    bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596

  • SSDEEP

    768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg

Malware Config

Targets

    • Target

      file.exe

    • Size

      50KB

    • MD5

      9d846bb9fbd2e4ce0a2344b02d535e9c

    • SHA1

      91bb1d20302d740b733d155bd42556038b900380

    • SHA256

      ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07

    • SHA512

      bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596

    • SSDEEP

      768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks