General

  • Target

    413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82

  • Size

    271KB

  • Sample

    231007-jetn6acb56

  • MD5

    1a745c946198f16fdcf3c902de26341b

  • SHA1

    b8ac4346dc294cdb8defdfdcd8169a8308f614c6

  • SHA256

    413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82

  • SHA512

    9bb81b59b63fbfc788f0df2cf3c3e56a92ef6bc714c4a12ce162d4eccd0c40307a75286338b1ad10b66a27d3563c53ca01a3a58572110e9c496fb06a780abf14

  • SSDEEP

    6144:yl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:KqXUHkUXe3GOkx2LIa

Score
10/10
upx

Malware Config

Targets

    • Target

      413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82

    • Size

      271KB

    • MD5

      1a745c946198f16fdcf3c902de26341b

    • SHA1

      b8ac4346dc294cdb8defdfdcd8169a8308f614c6

    • SHA256

      413d0b22a11c0b64927a06602585a2a71b7b608db8b77d2acb227d96b5847e82

    • SHA512

      9bb81b59b63fbfc788f0df2cf3c3e56a92ef6bc714c4a12ce162d4eccd0c40307a75286338b1ad10b66a27d3563c53ca01a3a58572110e9c496fb06a780abf14

    • SSDEEP

      6144:yl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:KqXUHkUXe3GOkx2LIa

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks