General

  • Target

    1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731

  • Size

    88KB

  • Sample

    240525-x3vs1sfc5w

  • MD5

    517ecb98b76239885324b2e7c7f1be97

  • SHA1

    69e7f9332a42febc6224828d5ffbaeb00a88338a

  • SHA256

    1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731

  • SHA512

    375128f08eaee049b4a4302923b43a6a14b76403bedc27a3d61c592124fce5a08f7ecf78aa1beb0d2b074f4f2ad69c1394b9f9bda1c880600a2d536b0952e3af

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu

Score
9/10

Malware Config

Targets

    • Target

      1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731

    • Size

      88KB

    • MD5

      517ecb98b76239885324b2e7c7f1be97

    • SHA1

      69e7f9332a42febc6224828d5ffbaeb00a88338a

    • SHA256

      1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731

    • SHA512

      375128f08eaee049b4a4302923b43a6a14b76403bedc27a3d61c592124fce5a08f7ecf78aa1beb0d2b074f4f2ad69c1394b9f9bda1c880600a2d536b0952e3af

    • SSDEEP

      1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks