General

  • Target

    0a47f22ff100f5408188acc9368595749c38d95d0eac8a58c656eb8a2c86b4b2

  • Size

    1.3MB

  • Sample

    240420-w5pt4seg54

  • MD5

    b96e56c33076fd492487ac26e3525874

  • SHA1

    4635af8d94f1a3a97ae7a97961ae96c6f824e3cb

  • SHA256

    0a47f22ff100f5408188acc9368595749c38d95d0eac8a58c656eb8a2c86b4b2

  • SHA512

    2f485c0e567460c2265228b17abd7d5744874aeca4ce8568b8d620500b976c6d53dedd5420353052c82e4ec1330f4829900183c6d87e9abaddf478fac2739440

  • SSDEEP

    24576:LQI2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpITCrEH7A:LwzxbUJndWeMln8FrmXmSmaITG

Score
10/10

Malware Config

Targets

    • Target

      0a47f22ff100f5408188acc9368595749c38d95d0eac8a58c656eb8a2c86b4b2

    • Size

      1.3MB

    • MD5

      b96e56c33076fd492487ac26e3525874

    • SHA1

      4635af8d94f1a3a97ae7a97961ae96c6f824e3cb

    • SHA256

      0a47f22ff100f5408188acc9368595749c38d95d0eac8a58c656eb8a2c86b4b2

    • SHA512

      2f485c0e567460c2265228b17abd7d5744874aeca4ce8568b8d620500b976c6d53dedd5420353052c82e4ec1330f4829900183c6d87e9abaddf478fac2739440

    • SSDEEP

      24576:LQI2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpITCrEH7A:LwzxbUJndWeMln8FrmXmSmaITG

    • UPX dump on OEP (original entry point)

    • Blocklisted process makes network request

    • Modifies AppInit DLL entries

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks