General

  • Target

    a167c6f4c18acef13e1923c2cb7947d7

  • Size

    60KB

  • Sample

    240224-kbrk3afb7w

  • MD5

    a167c6f4c18acef13e1923c2cb7947d7

  • SHA1

    81a6f0d86e9a6979b6870b6bad894a118f70adb4

  • SHA256

    57c0b576e421237eb9964bda5a2b33592d410f58163f4dfbf4e86ced20361759

  • SHA512

    6ee740414bc8724af2f63d8a935efbea89f62e22fcf68be208ee0fa0275b264de73833553e45ef9df57eb3285acfc51680a8b8dc15ccf381ef8cea99d11fa380

  • SSDEEP

    1536:XmscLfmnpbaycIxO7PDIv63BCZuPaOWjcloFsK:2inMyh63BCkPaOWyAsK

Score
7/10

Malware Config

Targets

    • Target

      a167c6f4c18acef13e1923c2cb7947d7

    • Size

      60KB

    • MD5

      a167c6f4c18acef13e1923c2cb7947d7

    • SHA1

      81a6f0d86e9a6979b6870b6bad894a118f70adb4

    • SHA256

      57c0b576e421237eb9964bda5a2b33592d410f58163f4dfbf4e86ced20361759

    • SHA512

      6ee740414bc8724af2f63d8a935efbea89f62e22fcf68be208ee0fa0275b264de73833553e45ef9df57eb3285acfc51680a8b8dc15ccf381ef8cea99d11fa380

    • SSDEEP

      1536:XmscLfmnpbaycIxO7PDIv63BCZuPaOWjcloFsK:2inMyh63BCkPaOWyAsK

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks