General

  • Target

    bf13ce7f380adf4408af45ed576f430cdf75a79d388e072e69a748a9142bca9c

  • Size

    271KB

  • Sample

    230930-nqw1waba2y

  • MD5

    652abe2dff915b50c76821e9038b7df7

  • SHA1

    33d1f4793961c4f08a7da1f4009d83126ffcfdb4

  • SHA256

    bf13ce7f380adf4408af45ed576f430cdf75a79d388e072e69a748a9142bca9c

  • SHA512

    60948cc0600273e194c5870d59e12e15ce846ea91d341425bb518fe7bf82bb92b713ef2bd74367231506c6ae538b4a8501d0eec6238d924a448ca6068e364c6d

  • SSDEEP

    6144:Yl51orRJXlDixHkUXe3tE0cEOkCybEaQRXr9HNdvOa:cqXUHkUXe3XOkx2LIa

Score
10/10

Malware Config

Targets

    • Target

      bf13ce7f380adf4408af45ed576f430cdf75a79d388e072e69a748a9142bca9c

    • Size

      271KB

    • MD5

      652abe2dff915b50c76821e9038b7df7

    • SHA1

      33d1f4793961c4f08a7da1f4009d83126ffcfdb4

    • SHA256

      bf13ce7f380adf4408af45ed576f430cdf75a79d388e072e69a748a9142bca9c

    • SHA512

      60948cc0600273e194c5870d59e12e15ce846ea91d341425bb518fe7bf82bb92b713ef2bd74367231506c6ae538b4a8501d0eec6238d924a448ca6068e364c6d

    • SSDEEP

      6144:Yl51orRJXlDixHkUXe3tE0cEOkCybEaQRXr9HNdvOa:cqXUHkUXe3XOkx2LIa

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks