General

  • Target

    194e670dffccd5785da26231d032e808.exe

  • Size

    403KB

  • Sample

    230612-nevcxabg26

  • MD5

    194e670dffccd5785da26231d032e808

  • SHA1

    0a6ce468233b96041edc69330a0efa4b90194b4f

  • SHA256

    e8483e9918697dc2fd3b4fc0fde38795851312dd38c1a6c83acdcaba47f8de7b

  • SHA512

    935183ef75fd7acf057773d96b9e41ea419a2705afa21193b13b763655d8659db5be141aad210e0afa241036b0d0610444de40b68168ccf711059be14ad8c890

  • SSDEEP

    3072:eZSUo1eprSwrXx0ooARRMkAHFIxobrvZkJv6SjaFvVmuLyRpPS68urGh3Lzs/vqq:enpNmooARiXCFT2Fp6SQaofZAC

Malware Config

Targets

    • Target

      194e670dffccd5785da26231d032e808.exe

    • Size

      403KB

    • MD5

      194e670dffccd5785da26231d032e808

    • SHA1

      0a6ce468233b96041edc69330a0efa4b90194b4f

    • SHA256

      e8483e9918697dc2fd3b4fc0fde38795851312dd38c1a6c83acdcaba47f8de7b

    • SHA512

      935183ef75fd7acf057773d96b9e41ea419a2705afa21193b13b763655d8659db5be141aad210e0afa241036b0d0610444de40b68168ccf711059be14ad8c890

    • SSDEEP

      3072:eZSUo1eprSwrXx0ooARRMkAHFIxobrvZkJv6SjaFvVmuLyRpPS68urGh3Lzs/vqq:enpNmooARiXCFT2Fp6SQaofZAC

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Sets service image path in registry

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks