General

  • Target

    dfb8266e5cdb85fdb9577ad8b390a9d4

  • Size

    123KB

  • Sample

    240326-v38c1afe99

  • MD5

    dfb8266e5cdb85fdb9577ad8b390a9d4

  • SHA1

    5b2b392829afba5f27f6a9783d0bbcb75bc478c7

  • SHA256

    59c5257461494e30e0d721e6cf86e17e86e71ad7dea459c5804b8d2b3c98596d

  • SHA512

    e7b4370a575c37845994f814d8d40be1eef130bef201ba8c30bdc7e64499954b0931257ec23bb7133c17d1e3fd8990306ce096a0d497f211fef8181486b24f96

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLdj7:OVYrJrOSsRwcpbH

Score
8/10
upx

Malware Config

Targets

    • Target

      dfb8266e5cdb85fdb9577ad8b390a9d4

    • Size

      123KB

    • MD5

      dfb8266e5cdb85fdb9577ad8b390a9d4

    • SHA1

      5b2b392829afba5f27f6a9783d0bbcb75bc478c7

    • SHA256

      59c5257461494e30e0d721e6cf86e17e86e71ad7dea459c5804b8d2b3c98596d

    • SHA512

      e7b4370a575c37845994f814d8d40be1eef130bef201ba8c30bdc7e64499954b0931257ec23bb7133c17d1e3fd8990306ce096a0d497f211fef8181486b24f96

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLdj7:OVYrJrOSsRwcpbH

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks