General

  • Target

    DefaultLayouts.reg

  • Size

    165KB

  • Sample

    230628-3bz7babd63

  • MD5

    5c69f0c1e4d20eef337d6502162325ed

  • SHA1

    4a685dc9e31aa80b5f7d592f24793bb6f9f934a9

  • SHA256

    ca172c1bb545d0ff578ef71621ce8d0a365d24891deb92c1ddba77de26e9a872

  • SHA512

    18d529b870f9d0c8a3ef837002437d3e670fdd053956c02d81cfcea4ced1563accf7617a74f56dce4e3f2dd1853cd1edf67de10218df25c3def6903c3d1a8838

  • SSDEEP

    768:Pxz333kKI5uaugKIZz0c2IJgZMTN0lZfZZ0+jIkawZoTfhDe9i7ddS7wu259OkbM:Pxh

Score
8/10

Malware Config

Targets

    • Target

      DefaultLayouts.reg

    • Size

      165KB

    • MD5

      5c69f0c1e4d20eef337d6502162325ed

    • SHA1

      4a685dc9e31aa80b5f7d592f24793bb6f9f934a9

    • SHA256

      ca172c1bb545d0ff578ef71621ce8d0a365d24891deb92c1ddba77de26e9a872

    • SHA512

      18d529b870f9d0c8a3ef837002437d3e670fdd053956c02d81cfcea4ced1563accf7617a74f56dce4e3f2dd1853cd1edf67de10218df25c3def6903c3d1a8838

    • SSDEEP

      768:Pxz333kKI5uaugKIZz0c2IJgZMTN0lZfZZ0+jIkawZoTfhDe9i7ddS7wu259OkbM:Pxh

    Score
    8/10
    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks