General

  • Target

    f63018ded1c90a8a4424d95d96ec98f75fc91fbbf0f8e5cc716dd4c8253c2370

  • Size

    2.4MB

  • Sample

    231104-mn8q8aga5v

  • MD5

    603d33fc48b10e93b2d43e7c8a917ff8

  • SHA1

    ea36fffdb9e5c7361dd1cdb4d898f9da440ea0d3

  • SHA256

    f63018ded1c90a8a4424d95d96ec98f75fc91fbbf0f8e5cc716dd4c8253c2370

  • SHA512

    39a5f100f93388c5ba578c84184332fd30b22bb882680e03cffce485f44fd75667b3e73506abe181f7547af0415b91c4693b7059242c180b6e194b2ad38b0f23

  • SSDEEP

    12288:qQxon+BNq9V11eX4CWKKCrZTGF/k8uMxtxPvvzFUEmFa6HHHu3wK:qQ6n+BUh1mJbKkKF/eMNPjSHHHc

Score
10/10

Malware Config

Targets

    • Target

      f63018ded1c90a8a4424d95d96ec98f75fc91fbbf0f8e5cc716dd4c8253c2370

    • Size

      2.4MB

    • MD5

      603d33fc48b10e93b2d43e7c8a917ff8

    • SHA1

      ea36fffdb9e5c7361dd1cdb4d898f9da440ea0d3

    • SHA256

      f63018ded1c90a8a4424d95d96ec98f75fc91fbbf0f8e5cc716dd4c8253c2370

    • SHA512

      39a5f100f93388c5ba578c84184332fd30b22bb882680e03cffce485f44fd75667b3e73506abe181f7547af0415b91c4693b7059242c180b6e194b2ad38b0f23

    • SSDEEP

      12288:qQxon+BNq9V11eX4CWKKCrZTGF/k8uMxtxPvvzFUEmFa6HHHu3wK:qQ6n+BUh1mJbKkKF/eMNPjSHHHc

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks