General

  • Target

    9d846bb9fbd2e4ce0a2344b02d535e9c.bin

  • Size

    24KB

  • Sample

    230611-b5nltsha5w

  • MD5

    b80ddd061824d8db0f2b28aa64cff468

  • SHA1

    f9fb58c47ec5f493c9cd6c2a2ce28ce4b86c2583

  • SHA256

    2eed2c255a6fc3dacb63b5dfa9bf5173d9685b2e8fc9de34094ad41d3aef61cf

  • SHA512

    b90daa4fb7a8ec35a8b202333c454c42830b19306de76fae4e3a54b4803bcb32290620ec2383c8734e419f36b3740c3a1709135f6368c8e7dff0f10f5ab56489

  • SSDEEP

    384:KImHpiL9YUM08GfnhJW1kCGvqBEFrkJij559H+BS3ds6dUh1GcNMNFsTBGci75:KOhYURTaGxGJi959SYR2h5MNcM/75

Malware Config

Targets

    • Target

      ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07.exe

    • Size

      50KB

    • MD5

      9d846bb9fbd2e4ce0a2344b02d535e9c

    • SHA1

      91bb1d20302d740b733d155bd42556038b900380

    • SHA256

      ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07

    • SHA512

      bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596

    • SSDEEP

      768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks