General

  • Target

    AZJLJ.zip

  • Size

    921KB

  • Sample

    231206-xa78msgd5z

  • MD5

    c7c11dfcb33ef2ac1822c97ac1b1ebb8

  • SHA1

    fc4ac01b1178b4e7984279f92d5ddae6838361ff

  • SHA256

    12b416d6a44e53ce1ddf9f5477281a38fedf8f72fdbc1a9aa2286dd139272f65

  • SHA512

    82655b6c91dc7535482bf5f04b27f565c276b630ede3eb63718ab29646505f1a802e64c8b576d65c5e3061530040038ac0b50d06611b5d200d0c2b6565ca9b59

  • SSDEEP

    24576:AsKmeUQfVNf1PEQ72fSk/btz17YZ3ns8eDb2oPvgk/MIQsrWTksqQ:AJLtNf1ce2ft/bR1EgPPT/MNsrWTksqQ

Score
8/10

Malware Config

Targets

    • Target

      Oic.msi

    • Size

      1.1MB

    • MD5

      e5f9b2809ffcda140bfb687572bea0f3

    • SHA1

      1e4f85f3c6c50d0035c12f15510ffd05775deee6

    • SHA256

      6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b

    • SHA512

      2474dfdd42fcf65b6e20accca4dd8c47dd829b38379805e72670af61f35ff9c6567358c0e58b5911c074010f408573173028c9346f2a5f1d4952732124527f77

    • SSDEEP

      24576:u5WnUeiNpNj02PsQ67IzRNYZcE++dQoDvgW/MI2crW6w:Aei3Nj9bMmhUtDD/MdcrW6w

    Score
    8/10
    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks