General

  • Target

    5bd02fc582e1d409ee0b93cda9e6298e

  • Size

    345KB

  • Sample

    240115-b6a25afhh9

  • MD5

    5bd02fc582e1d409ee0b93cda9e6298e

  • SHA1

    b16a71ba66a7b59c80a6987a3ea1dc51c2821d54

  • SHA256

    c0d8e682e87e06dc4f1b00f7be147c814f83191030a2b40c30e5aaafcebcf745

  • SHA512

    f5b53eb89dab45ca8e17a11fdac149803468531e870fee23d49a5b27281bd13b2c87c84ff7336ad24667fba42cef939ef8b923652a35251ccee21c37b9bf9844

  • SSDEEP

    6144:VQcKrxV6KTtTeDI/eMYZvC2PELKW8B/NGRO7nSy3haAZ9Pgz/wRDDno:VQcWTfTtTeI/eMYfQOFwM7Jaq9PSMLo

Malware Config

Targets

    • Target

      5bd02fc582e1d409ee0b93cda9e6298e

    • Size

      345KB

    • MD5

      5bd02fc582e1d409ee0b93cda9e6298e

    • SHA1

      b16a71ba66a7b59c80a6987a3ea1dc51c2821d54

    • SHA256

      c0d8e682e87e06dc4f1b00f7be147c814f83191030a2b40c30e5aaafcebcf745

    • SHA512

      f5b53eb89dab45ca8e17a11fdac149803468531e870fee23d49a5b27281bd13b2c87c84ff7336ad24667fba42cef939ef8b923652a35251ccee21c37b9bf9844

    • SSDEEP

      6144:VQcKrxV6KTtTeDI/eMYZvC2PELKW8B/NGRO7nSy3haAZ9Pgz/wRDDno:VQcWTfTtTeI/eMYfQOFwM7Jaq9PSMLo

    • Adds policy Run key to start application

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks