General

  • Target

    CustomFlow.dll

  • Size

    3.5MB

  • Sample

    231023-qb4taagg9w

  • MD5

    99aa0b6e217b5a17423db3c9bf95ba9c

  • SHA1

    3cb95698ad8a4379380f8513431cce3fdcee0f8d

  • SHA256

    98dddd9701e6e47e1c6329524d912c18cd01c178a5a847d15ae7770f5866f97d

  • SHA512

    d44cc15e03aaaaf17b70153453676781a281c4ca1b3ff8c3201d833d4307df1a69bf0f84f36b2bdaf654770eeac92ce14bea0f81f53ff01c0cf2280e7de53d1b

  • SSDEEP

    49152:5CTTyC+mE0xiQVGL1g7e0kEBr2RLdN6/zgum3TKzFdE2CQRTOxpIPP:5CznlxiQVGL1z0kEBr2Rb6/zgujFd

Malware Config

Targets

    • Target

      CustomFlow.dll

    • Size

      3.5MB

    • MD5

      99aa0b6e217b5a17423db3c9bf95ba9c

    • SHA1

      3cb95698ad8a4379380f8513431cce3fdcee0f8d

    • SHA256

      98dddd9701e6e47e1c6329524d912c18cd01c178a5a847d15ae7770f5866f97d

    • SHA512

      d44cc15e03aaaaf17b70153453676781a281c4ca1b3ff8c3201d833d4307df1a69bf0f84f36b2bdaf654770eeac92ce14bea0f81f53ff01c0cf2280e7de53d1b

    • SSDEEP

      49152:5CTTyC+mE0xiQVGL1g7e0kEBr2RLdN6/zgum3TKzFdE2CQRTOxpIPP:5CznlxiQVGL1z0kEBr2Rb6/zgujFd

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks