General

  • Target

    file

  • Size

    326KB

  • Sample

    240520-vtp53aab73

  • MD5

    a59664f37c25edaa69c39a65490ed3a9

  • SHA1

    01bb46541bc678fe9d97cea31cb61f3db861ba68

  • SHA256

    3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

  • SHA512

    76ba5fea9e63bf091ac2f2234447ad48c93b1b21594fd2c737d24073efc2871265c83622364764c886769d579c727784c045d3d4b2fc0a6e778dc30e64f1f393

  • SSDEEP

    6144:Rj8KWXflIwycVYUcBrcisb765kohreOCSYA/U:+Kkfl3x0BrcdEkoWCc

Score
8/10

Malware Config

Targets

    • Target

      file

    • Size

      326KB

    • MD5

      a59664f37c25edaa69c39a65490ed3a9

    • SHA1

      01bb46541bc678fe9d97cea31cb61f3db861ba68

    • SHA256

      3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

    • SHA512

      76ba5fea9e63bf091ac2f2234447ad48c93b1b21594fd2c737d24073efc2871265c83622364764c886769d579c727784c045d3d4b2fc0a6e778dc30e64f1f393

    • SSDEEP

      6144:Rj8KWXflIwycVYUcBrcisb765kohreOCSYA/U:+Kkfl3x0BrcdEkoWCc

    Score
    8/10
    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks