General

  • Target

    2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e

  • Size

    860KB

  • Sample

    240410-l6331sbh58

  • MD5

    3a2913d25c9f743aa19fe0581face480

  • SHA1

    f503677472863ffd1c60b71ceb5e3dcf74d16467

  • SHA256

    2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e

  • SHA512

    5cf1695161307b216cab4575a147dcf1244490090876b0e5c26178a4cc826546e5f8aed9b56bbe28c29f716bce0d314d613becae764ebe3ab95ce644058f2ae7

  • SSDEEP

    12288:y0nyfXuIBDtfuM2gsTv1Wt8r5NcDPsNprQy4a8Wyb8ywnVvRdkbHw3sHgd7:fny/f9uM2gev1E8UwNpEVaT0YoVHk7

Score
10/10

Malware Config

Targets

    • Target

      2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e

    • Size

      860KB

    • MD5

      3a2913d25c9f743aa19fe0581face480

    • SHA1

      f503677472863ffd1c60b71ceb5e3dcf74d16467

    • SHA256

      2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e

    • SHA512

      5cf1695161307b216cab4575a147dcf1244490090876b0e5c26178a4cc826546e5f8aed9b56bbe28c29f716bce0d314d613becae764ebe3ab95ce644058f2ae7

    • SSDEEP

      12288:y0nyfXuIBDtfuM2gsTv1Wt8r5NcDPsNprQy4a8Wyb8ywnVvRdkbHw3sHgd7:fny/f9uM2gev1E8UwNpEVaT0YoVHk7

    Score
    10/10
    • Detects PlugX payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks