General

  • Target

    93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6

  • Size

    2.5MB

  • Sample

    231101-1tdpxsde9z

  • MD5

    d7ac91afed57f5027fe2871b06e35f87

  • SHA1

    3749d7ca0fd3c357e9e300147e32ce4766bb239a

  • SHA256

    93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6

  • SHA512

    1c24a633b3ef001e886e0a57f4a2d40eacce11a014aee09ad90fcc50174e875f744e85054b3c5767082148c3c1c972b86dcf8c777972b227df17e97d61cc58c8

  • SSDEEP

    24576:tjSokU1riJjSow1NJbKkKF/eMNPjSHHHn:tjSn6riJjStv9KFeMW

Score
10/10
upx

Malware Config

Targets

    • Target

      93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6

    • Size

      2.5MB

    • MD5

      d7ac91afed57f5027fe2871b06e35f87

    • SHA1

      3749d7ca0fd3c357e9e300147e32ce4766bb239a

    • SHA256

      93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6

    • SHA512

      1c24a633b3ef001e886e0a57f4a2d40eacce11a014aee09ad90fcc50174e875f744e85054b3c5767082148c3c1c972b86dcf8c777972b227df17e97d61cc58c8

    • SSDEEP

      24576:tjSokU1riJjSow1NJbKkKF/eMNPjSHHHn:tjSn6riJjStv9KFeMW

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks