General

  • Target

    8a5001c9ae14ddd33f3792513696dda2b8cb1e5850db538423686ca36e9839e1

  • Size

    11.4MB

  • Sample

    240907-jd9c8asenf

  • MD5

    25307a44e1e8265af42ae0f26bc95877

  • SHA1

    4018094e873bd2c4f62e86dd38704956c477de94

  • SHA256

    8a5001c9ae14ddd33f3792513696dda2b8cb1e5850db538423686ca36e9839e1

  • SHA512

    ecb9257fc1fef31d08910fb9f06c79b6837759f3e460e7ec122c22f3616f29b7dff7b9a900613866f751b091bd1e7fc7f6b3583365b1bfcfce683323985b61eb

  • SSDEEP

    196608:Ndi0Plh5GsEgLy6iRs6DAC2266Z0jbU8lqWV6I81Lv8eDWzD:NNE2yjDACL03U8sW8I8tXWzD

Malware Config

Targets

    • Target

      8a5001c9ae14ddd33f3792513696dda2b8cb1e5850db538423686ca36e9839e1

    • Size

      11.4MB

    • MD5

      25307a44e1e8265af42ae0f26bc95877

    • SHA1

      4018094e873bd2c4f62e86dd38704956c477de94

    • SHA256

      8a5001c9ae14ddd33f3792513696dda2b8cb1e5850db538423686ca36e9839e1

    • SHA512

      ecb9257fc1fef31d08910fb9f06c79b6837759f3e460e7ec122c22f3616f29b7dff7b9a900613866f751b091bd1e7fc7f6b3583365b1bfcfce683323985b61eb

    • SSDEEP

      196608:Ndi0Plh5GsEgLy6iRs6DAC2266Z0jbU8lqWV6I81Lv8eDWzD:NNE2yjDACL03U8sW8I8tXWzD

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks