General

  • Target

    a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2

  • Size

    2.6MB

  • Sample

    240708-n9ekyayajj

  • MD5

    674b5e533d8bceaccfd18aa8e5c4d8a2

  • SHA1

    93f23682811395754497bd5d1b941a5d60639f5b

  • SHA256

    a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2

  • SHA512

    a815641bb49171e2578e2d8d4b9d9ef9b2bbb372de40aa9e5400b70af1b0b62ccbf71ae77a87e07a8751eef904bc02f211e298fee3bd51aec9e7e4f94f94c640

  • SSDEEP

    49152:Ii39+084E6W4W8Vm/hH49aXZmMAxPHdgjMzoQXinnLYHiWEWcHRqhBB:H+HVb4W8QZ49unMHdBXqDRHEBB

Score
8/10

Malware Config

Targets

    • Target

      a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2

    • Size

      2.6MB

    • MD5

      674b5e533d8bceaccfd18aa8e5c4d8a2

    • SHA1

      93f23682811395754497bd5d1b941a5d60639f5b

    • SHA256

      a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2

    • SHA512

      a815641bb49171e2578e2d8d4b9d9ef9b2bbb372de40aa9e5400b70af1b0b62ccbf71ae77a87e07a8751eef904bc02f211e298fee3bd51aec9e7e4f94f94c640

    • SSDEEP

      49152:Ii39+084E6W4W8Vm/hH49aXZmMAxPHdgjMzoQXinnLYHiWEWcHRqhBB:H+HVb4W8QZ49unMHdBXqDRHEBB

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks