General

  • Target

    285066dc1a042f13353bfb6f70aafe54

  • Size

    471KB

  • Sample

    231225-sk786segcn

  • MD5

    285066dc1a042f13353bfb6f70aafe54

  • SHA1

    d51c00b573a8c1e4a6f688a41bc7d9c9ee606f18

  • SHA256

    5c3be1eab91a7381b4d5cf46ce50b2509bd2c9016fc30285700cb3e7566677da

  • SHA512

    31cea536b8f1c4b205dae4964d5fdb8f3b8d67f92c63d26a27b195c857c8f2abba33f111776edfe8e29b0e070d6507cd407d83642fa3666b3da72ca09af67844

  • SSDEEP

    12288:vGHvS/cXhiEXTddLHSaEN02vggHujdBQzd8lnB:v2vS/wiEX/SFCgHwdmh8j

Malware Config

Targets

    • Target

      285066dc1a042f13353bfb6f70aafe54

    • Size

      471KB

    • MD5

      285066dc1a042f13353bfb6f70aafe54

    • SHA1

      d51c00b573a8c1e4a6f688a41bc7d9c9ee606f18

    • SHA256

      5c3be1eab91a7381b4d5cf46ce50b2509bd2c9016fc30285700cb3e7566677da

    • SHA512

      31cea536b8f1c4b205dae4964d5fdb8f3b8d67f92c63d26a27b195c857c8f2abba33f111776edfe8e29b0e070d6507cd407d83642fa3666b3da72ca09af67844

    • SSDEEP

      12288:vGHvS/cXhiEXTddLHSaEN02vggHujdBQzd8lnB:v2vS/wiEX/SFCgHwdmh8j

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks