General

  • Target

    53d7143189b5bdf2c7b18cba76853141

  • Size

    336KB

  • Sample

    231226-ez6r1aeec9

  • MD5

    53d7143189b5bdf2c7b18cba76853141

  • SHA1

    ab2f4036a579ca795d17479e1f2ffffd6d9987cb

  • SHA256

    9456c392bea1012192b9f8d2da19be0405d92475c2db80a08952c4917866951a

  • SHA512

    43dbf3dc3a8078b41b8d707f4e1107ccbe58a1921fbe46a70d17f88656f1745fb9c138ea8c31cbcdfe0d2ae53c03c26af9206338dfb133909b940d706f21f463

  • SSDEEP

    6144:kYMzNIyGf7cUrOIHyKKfsVOv53ffR21a8+FgvJoF+xkLMHrjxvKO86XpOAA:kLzeF7c48KK0VK3fflgvJv0Krjxd5ZX

Malware Config

Targets

    • Target

      53d7143189b5bdf2c7b18cba76853141

    • Size

      336KB

    • MD5

      53d7143189b5bdf2c7b18cba76853141

    • SHA1

      ab2f4036a579ca795d17479e1f2ffffd6d9987cb

    • SHA256

      9456c392bea1012192b9f8d2da19be0405d92475c2db80a08952c4917866951a

    • SHA512

      43dbf3dc3a8078b41b8d707f4e1107ccbe58a1921fbe46a70d17f88656f1745fb9c138ea8c31cbcdfe0d2ae53c03c26af9206338dfb133909b940d706f21f463

    • SSDEEP

      6144:kYMzNIyGf7cUrOIHyKKfsVOv53ffR21a8+FgvJoF+xkLMHrjxvKO86XpOAA:kLzeF7c48KK0VK3fflgvJv0Krjxd5ZX

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks