General

  • Target

    bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862

  • Size

    3.1MB

  • Sample

    231021-knv41sdf2z

  • MD5

    f407e8b2faee3715b87447b7f794ee32

  • SHA1

    7fb95c5f281b22b967988f4f84d11c8462d6bdd4

  • SHA256

    bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862

  • SHA512

    5ca1810022fbd431bf19f71ea5f5981726f5a01be29cff7fd304583ddc33f1957b86ae8f340f8b89f27d07e308a7572a418db2722c38aab6411df4bfc4c09724

  • SSDEEP

    24576:OQ6n+8aUyQ6n+BUzJbKkKF/eMNPjMeed7SHHHR:OQ6nkQ6nd9KFeMKW

Score
10/10

Malware Config

Targets

    • Target

      bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862

    • Size

      3.1MB

    • MD5

      f407e8b2faee3715b87447b7f794ee32

    • SHA1

      7fb95c5f281b22b967988f4f84d11c8462d6bdd4

    • SHA256

      bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862

    • SHA512

      5ca1810022fbd431bf19f71ea5f5981726f5a01be29cff7fd304583ddc33f1957b86ae8f340f8b89f27d07e308a7572a418db2722c38aab6411df4bfc4c09724

    • SSDEEP

      24576:OQ6n+8aUyQ6n+BUzJbKkKF/eMNPjMeed7SHHHR:OQ6nkQ6nd9KFeMKW

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks