Resubmissions

10-02-2024 20:14

240210-yz2ylafh5x 10

10-02-2024 19:58

240210-yp579shh45 10

General

  • Target

    f122b9d1ded8b58f9bfa3cffc77a5536cd112678aeab2.exe

  • Size

    40KB

  • Sample

    240210-yz2ylafh5x

  • MD5

    09b4e748b895299fc1a91a0403bd7a7c

  • SHA1

    92a216ab7b1c49fceb30fdeefdb3d6f2b33a87f5

  • SHA256

    f122b9d1ded8b58f9bfa3cffc77a5536cd112678aeab2065841478a70a712193

  • SHA512

    0f0b9843494ed082fcb7de5e0635ce829034ae0e7f0452bc0791abe79035c9c6b0ad1a11478e76d2b016cc5e4a327003ae873669e719c900787757be201b1886

  • SSDEEP

    768:CM81CbpqwmemPP3jYG8hEzo3opqTrwEckEFiRW:cwaPPJqoQTrwEFeiI

Malware Config

Targets

    • Target

      f122b9d1ded8b58f9bfa3cffc77a5536cd112678aeab2.exe

    • Size

      40KB

    • MD5

      09b4e748b895299fc1a91a0403bd7a7c

    • SHA1

      92a216ab7b1c49fceb30fdeefdb3d6f2b33a87f5

    • SHA256

      f122b9d1ded8b58f9bfa3cffc77a5536cd112678aeab2065841478a70a712193

    • SHA512

      0f0b9843494ed082fcb7de5e0635ce829034ae0e7f0452bc0791abe79035c9c6b0ad1a11478e76d2b016cc5e4a327003ae873669e719c900787757be201b1886

    • SSDEEP

      768:CM81CbpqwmemPP3jYG8hEzo3opqTrwEckEFiRW:cwaPPJqoQTrwEFeiI

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks