General
-
Target
CustomFlow.dll
-
Size
3.5MB
-
Sample
231023-qb4taagg9w
-
MD5
99aa0b6e217b5a17423db3c9bf95ba9c
-
SHA1
3cb95698ad8a4379380f8513431cce3fdcee0f8d
-
SHA256
98dddd9701e6e47e1c6329524d912c18cd01c178a5a847d15ae7770f5866f97d
-
SHA512
d44cc15e03aaaaf17b70153453676781a281c4ca1b3ff8c3201d833d4307df1a69bf0f84f36b2bdaf654770eeac92ce14bea0f81f53ff01c0cf2280e7de53d1b
-
SSDEEP
49152:5CTTyC+mE0xiQVGL1g7e0kEBr2RLdN6/zgum3TKzFdE2CQRTOxpIPP:5CznlxiQVGL1z0kEBr2Rb6/zgujFd
Static task
static1
Behavioral task
behavioral1
Sample
CustomFlow.dll
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
CustomFlow.dll
-
Size
3.5MB
-
MD5
99aa0b6e217b5a17423db3c9bf95ba9c
-
SHA1
3cb95698ad8a4379380f8513431cce3fdcee0f8d
-
SHA256
98dddd9701e6e47e1c6329524d912c18cd01c178a5a847d15ae7770f5866f97d
-
SHA512
d44cc15e03aaaaf17b70153453676781a281c4ca1b3ff8c3201d833d4307df1a69bf0f84f36b2bdaf654770eeac92ce14bea0f81f53ff01c0cf2280e7de53d1b
-
SSDEEP
49152:5CTTyC+mE0xiQVGL1g7e0kEBr2RLdN6/zgum3TKzFdE2CQRTOxpIPP:5CznlxiQVGL1z0kEBr2Rb6/zgujFd
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1