General

  • Target

    e5111f675fbcb70b933d164b1a42c8996a5bad385247c66ad4a16a0ac3d9cf6a.exe

  • Size

    4.3MB

  • Sample

    240523-cmermsac56

  • MD5

    151bbb9dc3b4b8a39a5ee35695994d2c

  • SHA1

    5437504233190f8f972a6d1725622e77cfc011aa

  • SHA256

    e5111f675fbcb70b933d164b1a42c8996a5bad385247c66ad4a16a0ac3d9cf6a

  • SHA512

    1292a586f10f52c9e393fee09ac56d33107599330230ba0f571189fc2a8d2caa411f818c37a3cd661f13882bdd747369520c1707412141a29de81eaf0e2e4e66

  • SSDEEP

    98304:TJnZwyJZJBZnGirmQw+jYnMmu1g/dgh9GOYWe6CK/crK/c:TJWyrvZnGqhvk01g/dqGOze6Cfrf

Score
9/10
upx

Malware Config

Targets

    • Target

      e5111f675fbcb70b933d164b1a42c8996a5bad385247c66ad4a16a0ac3d9cf6a.exe

    • Size

      4.3MB

    • MD5

      151bbb9dc3b4b8a39a5ee35695994d2c

    • SHA1

      5437504233190f8f972a6d1725622e77cfc011aa

    • SHA256

      e5111f675fbcb70b933d164b1a42c8996a5bad385247c66ad4a16a0ac3d9cf6a

    • SHA512

      1292a586f10f52c9e393fee09ac56d33107599330230ba0f571189fc2a8d2caa411f818c37a3cd661f13882bdd747369520c1707412141a29de81eaf0e2e4e66

    • SSDEEP

      98304:TJnZwyJZJBZnGirmQw+jYnMmu1g/dgh9GOYWe6CK/crK/c:TJWyrvZnGqhvk01g/dqGOze6Cfrf

    Score
    9/10
    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks