General

  • Target

    4497502704f1637e54cbafcb78c663aa

  • Size

    123KB

  • Sample

    240105-2dh55sdab3

  • MD5

    4497502704f1637e54cbafcb78c663aa

  • SHA1

    ca4202e7683a833769ca5ef4e70825172407fbef

  • SHA256

    6c344ed5272f2ffa9d450b5e162aa45a26ca04e41d7b588851b244d932c7fecc

  • SHA512

    be7cada90149ed1f9f1825502b481b269780d618e3e37624d3c668b092f634ccc073ba75db097c05f029393858cc72f3d4673178b768182498ee0a37f97c2144

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLgmxljW:OVYrJrOSsRwcp2C0

Score
8/10
upx

Malware Config

Targets

    • Target

      4497502704f1637e54cbafcb78c663aa

    • Size

      123KB

    • MD5

      4497502704f1637e54cbafcb78c663aa

    • SHA1

      ca4202e7683a833769ca5ef4e70825172407fbef

    • SHA256

      6c344ed5272f2ffa9d450b5e162aa45a26ca04e41d7b588851b244d932c7fecc

    • SHA512

      be7cada90149ed1f9f1825502b481b269780d618e3e37624d3c668b092f634ccc073ba75db097c05f029393858cc72f3d4673178b768182498ee0a37f97c2144

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLgmxljW:OVYrJrOSsRwcp2C0

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks