General

  • Target

    eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

  • Size

    43KB

  • Sample

    240217-ze6xgsbb96

  • MD5

    ed3326070afd94f87cdaf84b73e6e9ef

  • SHA1

    672a4894dbfccee529479f48b72a5d9387bf4e80

  • SHA256

    eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

  • SHA512

    e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948

  • SSDEEP

    768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb

Malware Config

Targets

    • Target

      eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

    • Size

      43KB

    • MD5

      ed3326070afd94f87cdaf84b73e6e9ef

    • SHA1

      672a4894dbfccee529479f48b72a5d9387bf4e80

    • SHA256

      eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e

    • SHA512

      e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948

    • SSDEEP

      768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks