General

  • Target

    3e5d00a0c1631e94b08f8fa84145748f5616662a89e2c0b4d5df3dba864b217c.exe

  • Size

    146KB

  • Sample

    240213-dcb4faeb23

  • MD5

    ed9f7a9870f20f13ae0521ef922463ef

  • SHA1

    bd2e8abbe8258c6c9c16ab7d8cba11a9d73f28e8

  • SHA256

    3e5d00a0c1631e94b08f8fa84145748f5616662a89e2c0b4d5df3dba864b217c

  • SHA512

    16650c47c11fe03f3b7a19b04fdb1a3d30c8430df9f9136976546ca0b1b48e39ea24949322db08d067b799e3bd568d716af49cfe398b96df2b923429c416aa95

  • SSDEEP

    3072:3gHIxZV+Lu+djDW67COI/4PNzp4e/ZV7ypAjvyNaTsOhzynOhzyE:Qo/+/DV7CiPNeI/VxzyyzyE

Score
8/10

Malware Config

Targets

    • Target

      3e5d00a0c1631e94b08f8fa84145748f5616662a89e2c0b4d5df3dba864b217c.exe

    • Size

      146KB

    • MD5

      ed9f7a9870f20f13ae0521ef922463ef

    • SHA1

      bd2e8abbe8258c6c9c16ab7d8cba11a9d73f28e8

    • SHA256

      3e5d00a0c1631e94b08f8fa84145748f5616662a89e2c0b4d5df3dba864b217c

    • SHA512

      16650c47c11fe03f3b7a19b04fdb1a3d30c8430df9f9136976546ca0b1b48e39ea24949322db08d067b799e3bd568d716af49cfe398b96df2b923429c416aa95

    • SSDEEP

      3072:3gHIxZV+Lu+djDW67COI/4PNzp4e/ZV7ypAjvyNaTsOhzynOhzyE:Qo/+/DV7CiPNeI/VxzyyzyE

    Score
    8/10
    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks