General

  • Target

    215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa

  • Size

    2.3MB

  • Sample

    230918-lmnh8aag97

  • MD5

    e411dafeed1860501790f8ae6ae7a95d

  • SHA1

    fcb250e133067714ff87bf1483c7d3e11d6fc1be

  • SHA256

    215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa

  • SHA512

    f52f0ad99cd9acdff0693b528395f6040b23de8019e892a9c86beac1f5c6f56418224aa9f54490324cd1ae54a502ba338162f083ee1a7a464e97a045ca06270e

  • SSDEEP

    49152:4vODijuUoszTB8QXnQv6tj1SQYSQG9KFeMs:4mDb6ZEQFZ0Fep

Score
10/10
upx

Malware Config

Targets

    • Target

      215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa

    • Size

      2.3MB

    • MD5

      e411dafeed1860501790f8ae6ae7a95d

    • SHA1

      fcb250e133067714ff87bf1483c7d3e11d6fc1be

    • SHA256

      215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa

    • SHA512

      f52f0ad99cd9acdff0693b528395f6040b23de8019e892a9c86beac1f5c6f56418224aa9f54490324cd1ae54a502ba338162f083ee1a7a464e97a045ca06270e

    • SSDEEP

      49152:4vODijuUoszTB8QXnQv6tj1SQYSQG9KFeMs:4mDb6ZEQFZ0Fep

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks