General

  • Target

    b7e3905bf90cdc3ee6c257bb2a1899d292dfabd4c9b3da607550ea53ea43c322

  • Size

    176KB

  • Sample

    240711-e6g28ayhnj

  • MD5

    aadf9bfdf5c7c7067ace16dcfc8310b0

  • SHA1

    f4c5721205c62fad3ab9e35420736ac8fa4802b6

  • SHA256

    b7e3905bf90cdc3ee6c257bb2a1899d292dfabd4c9b3da607550ea53ea43c322

  • SHA512

    f07f81840033c2d7de87d8ea63694a28ffb602df7d3b7499bb8b94812c1e212404816ed6b907bd2b2c8786f30bffe7d4db9a5425314291012c7ceb5bb4f6f5cf

  • SSDEEP

    1536:PiD5LttXP8x6l59XhDMfqu5WArMp4g88HaeEIc8J9O8uwdbK87awQM1Zv9HoULf+:PiVj/n1Y4p4gMRIO8uwBKEQ+cULflQnv

Score
8/10
upx

Malware Config

Targets

    • Target

      b7e3905bf90cdc3ee6c257bb2a1899d292dfabd4c9b3da607550ea53ea43c322

    • Size

      176KB

    • MD5

      aadf9bfdf5c7c7067ace16dcfc8310b0

    • SHA1

      f4c5721205c62fad3ab9e35420736ac8fa4802b6

    • SHA256

      b7e3905bf90cdc3ee6c257bb2a1899d292dfabd4c9b3da607550ea53ea43c322

    • SHA512

      f07f81840033c2d7de87d8ea63694a28ffb602df7d3b7499bb8b94812c1e212404816ed6b907bd2b2c8786f30bffe7d4db9a5425314291012c7ceb5bb4f6f5cf

    • SSDEEP

      1536:PiD5LttXP8x6l59XhDMfqu5WArMp4g88HaeEIc8J9O8uwdbK87awQM1Zv9HoULf+:PiVj/n1Y4p4gMRIO8uwBKEQ+cULflQnv

    Score
    8/10
    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks