General

  • Target

    43a1212d319ae37016aaf8394c837f94beb72526a62e8d795ca8cfee4d828f16

  • Size

    1.1MB

  • Sample

    231004-dafzlsgf9w

  • MD5

    0cecb3eea0d83075069406d702f85229

  • SHA1

    666854907487d98166ca89f91247b3678d526fa0

  • SHA256

    43a1212d319ae37016aaf8394c837f94beb72526a62e8d795ca8cfee4d828f16

  • SHA512

    81ddbcf324cb23778d7c6f6940776394e94cc09091579d65857fa3e7a6b6e8276c9d837c3aa76c0afcee403c17c72805086246d395ea6be3aa0101f5deb7840c

  • SSDEEP

    6144:Fl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa51BgVWWStmyyye/:TqXUHkUXe3GOkx2LIazBg0tmyyyI

Score
10/10
upx

Malware Config

Targets

    • Target

      43a1212d319ae37016aaf8394c837f94beb72526a62e8d795ca8cfee4d828f16

    • Size

      1.1MB

    • MD5

      0cecb3eea0d83075069406d702f85229

    • SHA1

      666854907487d98166ca89f91247b3678d526fa0

    • SHA256

      43a1212d319ae37016aaf8394c837f94beb72526a62e8d795ca8cfee4d828f16

    • SHA512

      81ddbcf324cb23778d7c6f6940776394e94cc09091579d65857fa3e7a6b6e8276c9d837c3aa76c0afcee403c17c72805086246d395ea6be3aa0101f5deb7840c

    • SSDEEP

      6144:Fl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa51BgVWWStmyyye/:TqXUHkUXe3GOkx2LIazBg0tmyyyI

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks