General

  • Target

    JC_9acb0858b9f649b6e24842ae735455a01c41e96fb115948351201bc794b78ac9

  • Size

    1.8MB

  • Sample

    231012-skg2zsff51

  • MD5

    00bf8537a81b973bd6d311ee8d4849ba

  • SHA1

    79333847b9cd6c516d45754a695ecd2eeafd95f3

  • SHA256

    9acb0858b9f649b6e24842ae735455a01c41e96fb115948351201bc794b78ac9

  • SHA512

    359d0213b63d7c80f63fb9d744bd39efe283e99051e4c3602d273c6253f994e63b051f904210b6e7e964623cbf019e644a6af119a641ca14600ea71b9ec33cb6

  • SSDEEP

    24576:AvOfDqljuJXrC8uF6cl7zTBaOkx2LFlHOkx2LFV6H3cFgrs:AvODijuUoszTB8QXnQv6sug

Score
10/10
upx

Malware Config

Targets

    • Target

      JC_9acb0858b9f649b6e24842ae735455a01c41e96fb115948351201bc794b78ac9

    • Size

      1.8MB

    • MD5

      00bf8537a81b973bd6d311ee8d4849ba

    • SHA1

      79333847b9cd6c516d45754a695ecd2eeafd95f3

    • SHA256

      9acb0858b9f649b6e24842ae735455a01c41e96fb115948351201bc794b78ac9

    • SHA512

      359d0213b63d7c80f63fb9d744bd39efe283e99051e4c3602d273c6253f994e63b051f904210b6e7e964623cbf019e644a6af119a641ca14600ea71b9ec33cb6

    • SSDEEP

      24576:AvOfDqljuJXrC8uF6cl7zTBaOkx2LFlHOkx2LFV6H3cFgrs:AvODijuUoszTB8QXnQv6sug

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks