General

  • Target

    6d6621eae014f46d32ce46dff27de52a.exe

  • Size

    257KB

  • Sample

    240207-hzfscsfegr

  • MD5

    6d6621eae014f46d32ce46dff27de52a

  • SHA1

    73751d4be7a24d55bd49ea39af188960370e1274

  • SHA256

    a4dd7691d3c288e866d9bf8c33d79469872d76b1c5eb3e29f76999c2e79a060d

  • SHA512

    dd82cb5e8fb6984f6f29ad2043614fbc5882b17a70544efe6fc69de281818df40a790109bc2df47bd7cfc03c359e6a2969d1e664c1d195568c1c8c6006b485b7

  • SSDEEP

    6144:zcTdKzK/R260FJM38oj49GP7gXbgXPr4lQz:zpzWhgO38oj4EgXbmrgQz

Malware Config

Targets

    • Target

      6d6621eae014f46d32ce46dff27de52a.exe

    • Size

      257KB

    • MD5

      6d6621eae014f46d32ce46dff27de52a

    • SHA1

      73751d4be7a24d55bd49ea39af188960370e1274

    • SHA256

      a4dd7691d3c288e866d9bf8c33d79469872d76b1c5eb3e29f76999c2e79a060d

    • SHA512

      dd82cb5e8fb6984f6f29ad2043614fbc5882b17a70544efe6fc69de281818df40a790109bc2df47bd7cfc03c359e6a2969d1e664c1d195568c1c8c6006b485b7

    • SSDEEP

      6144:zcTdKzK/R260FJM38oj49GP7gXbgXPr4lQz:zpzWhgO38oj4EgXbmrgQz

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks