General

  • Target

    72d1253567013982da303392fa5fdf69

  • Size

    183KB

  • Sample

    240124-xs9jesgbc6

  • MD5

    72d1253567013982da303392fa5fdf69

  • SHA1

    7da9835e7e94a7eb0d3e8bedcc5fba3b6ed07d33

  • SHA256

    6c1ad5aaf74abb724980992dd5bb7f35a4a6911e74bfb46a15291dc6937e78de

  • SHA512

    63af41de3fbc07c29e284ec69b368e5ed2231e3dc5c0fbf5ed9ed5ba9da178aed36833c75e23cbbdd9aa2b7336c407328635f217be900eedf16eea23c30878af

  • SSDEEP

    3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVl:Eazq3aipalYuhoao5sQkz9WS

Score
8/10
upx

Malware Config

Targets

    • Target

      72d1253567013982da303392fa5fdf69

    • Size

      183KB

    • MD5

      72d1253567013982da303392fa5fdf69

    • SHA1

      7da9835e7e94a7eb0d3e8bedcc5fba3b6ed07d33

    • SHA256

      6c1ad5aaf74abb724980992dd5bb7f35a4a6911e74bfb46a15291dc6937e78de

    • SHA512

      63af41de3fbc07c29e284ec69b368e5ed2231e3dc5c0fbf5ed9ed5ba9da178aed36833c75e23cbbdd9aa2b7336c407328635f217be900eedf16eea23c30878af

    • SSDEEP

      3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVl:Eazq3aipalYuhoao5sQkz9WS

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks