General

  • Target

    4af841756f5a44f35aeab52b9eaee3340677a4b5292a6a724893a922162d32bd

  • Size

    271KB

  • Sample

    231007-jejtyscb53

  • MD5

    c96ed183fea1d9109f5d70fdc5249743

  • SHA1

    727efaf977262b9c44c5719ece1d0a32c3f1fe68

  • SHA256

    4af841756f5a44f35aeab52b9eaee3340677a4b5292a6a724893a922162d32bd

  • SHA512

    d203275c924a112432c6f7f342f69f254d7b8d8dc8be82bf9da80d0868632b99b526405a157d5d319a193862007307cbb7e7f97afe6833ebd95eee3fc2b192a7

  • SSDEEP

    6144:8l51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:gqXUHkUXe3GOkx2LIa

Score
10/10
upx

Malware Config

Targets

    • Target

      4af841756f5a44f35aeab52b9eaee3340677a4b5292a6a724893a922162d32bd

    • Size

      271KB

    • MD5

      c96ed183fea1d9109f5d70fdc5249743

    • SHA1

      727efaf977262b9c44c5719ece1d0a32c3f1fe68

    • SHA256

      4af841756f5a44f35aeab52b9eaee3340677a4b5292a6a724893a922162d32bd

    • SHA512

      d203275c924a112432c6f7f342f69f254d7b8d8dc8be82bf9da80d0868632b99b526405a157d5d319a193862007307cbb7e7f97afe6833ebd95eee3fc2b192a7

    • SSDEEP

      6144:8l51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:gqXUHkUXe3GOkx2LIa

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks