General

  • Target

    file

  • Size

    588KB

  • Sample

    240131-kys3eaggf4

  • MD5

    72291a2593e330da68e21589b3977f54

  • SHA1

    3794f9d0141d1e11cfd18c67d4cff133a307e690

  • SHA256

    86674590d311280ebafc9d0ea35a17c5f7a7d6edc335baaaee38309c57c73a77

  • SHA512

    af9c01efb461e5309b73b42cf59335a7315747c704372fa3ec73e59fe65abefd2aea7a04e654de4c24a66b6ea82510c2ed9c8f9377423a80089913517e584039

  • SSDEEP

    12288:vB+aefZumiXlRtigIw2BNLCXqRQtHdqrt218q72dY8lE:vsa6u/ZKCcmdqw6S2dRE

Malware Config

Targets

    • Target

      file

    • Size

      588KB

    • MD5

      72291a2593e330da68e21589b3977f54

    • SHA1

      3794f9d0141d1e11cfd18c67d4cff133a307e690

    • SHA256

      86674590d311280ebafc9d0ea35a17c5f7a7d6edc335baaaee38309c57c73a77

    • SHA512

      af9c01efb461e5309b73b42cf59335a7315747c704372fa3ec73e59fe65abefd2aea7a04e654de4c24a66b6ea82510c2ed9c8f9377423a80089913517e584039

    • SSDEEP

      12288:vB+aefZumiXlRtigIw2BNLCXqRQtHdqrt218q72dY8lE:vsa6u/ZKCcmdqw6S2dRE

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks