General

  • Target

    3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe

  • Size

    326KB

  • Sample

    240521-bj1n9sdc36

  • MD5

    a59664f37c25edaa69c39a65490ed3a9

  • SHA1

    01bb46541bc678fe9d97cea31cb61f3db861ba68

  • SHA256

    3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

  • SHA512

    76ba5fea9e63bf091ac2f2234447ad48c93b1b21594fd2c737d24073efc2871265c83622364764c886769d579c727784c045d3d4b2fc0a6e778dc30e64f1f393

  • SSDEEP

    6144:Rj8KWXflIwycVYUcBrcisb765kohreOCSYA/U:+Kkfl3x0BrcdEkoWCc

Score
9/10

Malware Config

Targets

    • Target

      3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe

    • Size

      326KB

    • MD5

      a59664f37c25edaa69c39a65490ed3a9

    • SHA1

      01bb46541bc678fe9d97cea31cb61f3db861ba68

    • SHA256

      3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

    • SHA512

      76ba5fea9e63bf091ac2f2234447ad48c93b1b21594fd2c737d24073efc2871265c83622364764c886769d579c727784c045d3d4b2fc0a6e778dc30e64f1f393

    • SSDEEP

      6144:Rj8KWXflIwycVYUcBrcisb765kohreOCSYA/U:+Kkfl3x0BrcdEkoWCc

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks