General

  • Target

    e032304d4ee57cce4867bbd93a573111

  • Size

    23KB

  • Sample

    240326-1w89lsde55

  • MD5

    e032304d4ee57cce4867bbd93a573111

  • SHA1

    8d52c40ee95c5010b51eb589a94b35f93cbd23cd

  • SHA256

    bdd090a11ee4ca5d61a31c1c640cdfd3fd9427c44e629bd15e638ff57d9fd3bf

  • SHA512

    0d380717dd3c4b288015fe7ab57b50fe28a8e9ce594a813aa1fdf68c11abfb3bb194664d25376669361f3d88704df8788a115b23963bc35cfecc5cce23c5d964

  • SSDEEP

    384:Lo5Ps7lMmqIXFs6gkZyLat3+ndiDX2PLhlDe2IHLl4AIanjHDmo8gAS3Y:koM+XFjgkZym+kDXcipHOAP38gAUY

Score
8/10

Malware Config

Targets

    • Target

      e032304d4ee57cce4867bbd93a573111

    • Size

      23KB

    • MD5

      e032304d4ee57cce4867bbd93a573111

    • SHA1

      8d52c40ee95c5010b51eb589a94b35f93cbd23cd

    • SHA256

      bdd090a11ee4ca5d61a31c1c640cdfd3fd9427c44e629bd15e638ff57d9fd3bf

    • SHA512

      0d380717dd3c4b288015fe7ab57b50fe28a8e9ce594a813aa1fdf68c11abfb3bb194664d25376669361f3d88704df8788a115b23963bc35cfecc5cce23c5d964

    • SSDEEP

      384:Lo5Ps7lMmqIXFs6gkZyLat3+ndiDX2PLhlDe2IHLl4AIanjHDmo8gAS3Y:koM+XFjgkZym+kDXcipHOAP38gAUY

    Score
    8/10
    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks