General

  • Target

    1458b9f5cfa980d057da25e3ca2e61af

  • Size

    548KB

  • Sample

    231225-ldmwbsgdan

  • MD5

    1458b9f5cfa980d057da25e3ca2e61af

  • SHA1

    8d70149a00226cbc0787b9c1a00f419400d00672

  • SHA256

    5b3635af5764de1c8f2b690d2814f76bfb4b3229e8d17681c6459bf7806ddfd9

  • SHA512

    0d71f32c63cee7ad714a9b38178628bb041a616a07475b3020c2351f33cacfe697891c153a070a281a0a29e71291d462603106f4364040ac6f6e3d8e235212a2

  • SSDEEP

    12288:AbEtWoMZfaFtuKo5qKMnLYuyqnzN+y1kz1LxCOAwst:sloUf+o5qJnV9+y1IXs

Score
10/10

Malware Config

Targets

    • Target

      1458b9f5cfa980d057da25e3ca2e61af

    • Size

      548KB

    • MD5

      1458b9f5cfa980d057da25e3ca2e61af

    • SHA1

      8d70149a00226cbc0787b9c1a00f419400d00672

    • SHA256

      5b3635af5764de1c8f2b690d2814f76bfb4b3229e8d17681c6459bf7806ddfd9

    • SHA512

      0d71f32c63cee7ad714a9b38178628bb041a616a07475b3020c2351f33cacfe697891c153a070a281a0a29e71291d462603106f4364040ac6f6e3d8e235212a2

    • SSDEEP

      12288:AbEtWoMZfaFtuKo5qKMnLYuyqnzN+y1kz1LxCOAwst:sloUf+o5qJnV9+y1IXs

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks