General

  • Target

    63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf

  • Size

    399KB

  • Sample

    231114-jv1gmshg86

  • MD5

    e3ca2c1817f5886acd4891afe806f971

  • SHA1

    668a42b64aab015676f0d044b646d2248d6c25bf

  • SHA256

    63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf

  • SHA512

    cef5ee8309f26f313311fc74047110e74f91af82ccb24ed6627ebec8eaf6d544e67632324ce2776eb93cf02166166f08af9b3656cb1c8ebb32857b9d96619add

  • SSDEEP

    6144:YZmsQhU+bZVx5rLKJzu6gLP44ZwcDy/qF6cEOkCybEaQRXr9HNdvOapLv:8UF30Ngj44ecDyfOkx2LIapLv

Score
10/10

Malware Config

Targets

    • Target

      63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf

    • Size

      399KB

    • MD5

      e3ca2c1817f5886acd4891afe806f971

    • SHA1

      668a42b64aab015676f0d044b646d2248d6c25bf

    • SHA256

      63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf

    • SHA512

      cef5ee8309f26f313311fc74047110e74f91af82ccb24ed6627ebec8eaf6d544e67632324ce2776eb93cf02166166f08af9b3656cb1c8ebb32857b9d96619add

    • SSDEEP

      6144:YZmsQhU+bZVx5rLKJzu6gLP44ZwcDy/qF6cEOkCybEaQRXr9HNdvOapLv:8UF30Ngj44ecDyfOkx2LIapLv

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks