General

  • Target

    7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe

  • Size

    156KB

  • Sample

    231013-b2xqbsbd36

  • MD5

    7b4514e0db419bfea9a2ea64f974ede0

  • SHA1

    439774ded418431619b4d42ce0c090739b685eaa

  • SHA256

    b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

  • SHA512

    3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

  • SSDEEP

    3072:ovMweMP+MQ+U1gqZNGeyfiwSh4xylYN8IsfbkD1DR3gq27bkDK:w+x1xZsLaph/D7o

Score
10/10

Malware Config

Targets

    • Target

      7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe

    • Size

      156KB

    • MD5

      7b4514e0db419bfea9a2ea64f974ede0

    • SHA1

      439774ded418431619b4d42ce0c090739b685eaa

    • SHA256

      b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

    • SHA512

      3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

    • SSDEEP

      3072:ovMweMP+MQ+U1gqZNGeyfiwSh4xylYN8IsfbkD1DR3gq27bkDK:w+x1xZsLaph/D7o

    Score
    10/10
    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks