General

  • Target

    46975109aa4c05a5301ca4bcd1ae26c743caa723a772863c57bdcf721a100d02

  • Size

    2.4MB

  • Sample

    231112-krcf3sdf41

  • MD5

    e5eef0e0c5daf17bee42a5fbf42c01cd

  • SHA1

    0f73635c6075af79214ea8256fecbe46efe567f5

  • SHA256

    46975109aa4c05a5301ca4bcd1ae26c743caa723a772863c57bdcf721a100d02

  • SHA512

    6b888802e97fa46562d059973415cf33c4404e9415ed7eb4d3140cd73d57b99b0b7b8dc32e3ddb62804852a415b53d5babadd1ced07f94de0826bfb260ac1911

  • SSDEEP

    24576:bjSokU1rigjSow13JbKkKF/eMNPj7F5vvFvXn:bjSn6rigjSt59KFeMJF5vvFvXn

Score
10/10
upx

Malware Config

Targets

    • Target

      46975109aa4c05a5301ca4bcd1ae26c743caa723a772863c57bdcf721a100d02

    • Size

      2.4MB

    • MD5

      e5eef0e0c5daf17bee42a5fbf42c01cd

    • SHA1

      0f73635c6075af79214ea8256fecbe46efe567f5

    • SHA256

      46975109aa4c05a5301ca4bcd1ae26c743caa723a772863c57bdcf721a100d02

    • SHA512

      6b888802e97fa46562d059973415cf33c4404e9415ed7eb4d3140cd73d57b99b0b7b8dc32e3ddb62804852a415b53d5babadd1ced07f94de0826bfb260ac1911

    • SSDEEP

      24576:bjSokU1rigjSow13JbKkKF/eMNPj7F5vvFvXn:bjSn6rigjSt59KFeMJF5vvFvXn

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks