General

  • Target

    Archive.zip

  • Size

    25.8MB

  • Sample

    240810-zn7kda1hmh

  • MD5

    68735cbac29491b66fe6e43a995f0924

  • SHA1

    e40cd489e8c2c0ef410511f12136bba131f62279

  • SHA256

    7bb3ae1f769214ef81fec8577a029263f2abdd118ebd2fccca81343ca6e0c984

  • SHA512

    0d3a422cccaf311f7b976e4418f568b21a0267e2a2279bb3feb5867928bc15494814e1c48722f6fce4ade301e22040d70ad6d1e6d4bb3043cc1aa601c173494e

  • SSDEEP

    786432:Sih0BNLGxdjkk738RIWwJGDixW0NizKLMM:SihMkTI6381wEDickizKz

Score
7/10

Malware Config

Targets

    • Target

      Archive.zip

    • Size

      25.8MB

    • MD5

      68735cbac29491b66fe6e43a995f0924

    • SHA1

      e40cd489e8c2c0ef410511f12136bba131f62279

    • SHA256

      7bb3ae1f769214ef81fec8577a029263f2abdd118ebd2fccca81343ca6e0c984

    • SHA512

      0d3a422cccaf311f7b976e4418f568b21a0267e2a2279bb3feb5867928bc15494814e1c48722f6fce4ade301e22040d70ad6d1e6d4bb3043cc1aa601c173494e

    • SSDEEP

      786432:Sih0BNLGxdjkk738RIWwJGDixW0NizKLMM:SihMkTI6381wEDickizKz

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks