General

  • Target

    a299c8c1f52f7b583f93c16a27c0782524618a5a0b72f1f75a982826a71dbc45

  • Size

    11.4MB

  • Sample

    240913-fhkzmswaqd

  • MD5

    e3ba0d2a5dea90d8fa68186361840f10

  • SHA1

    3990ff15349a66e6b01d55d1775a300d4d93d097

  • SHA256

    a299c8c1f52f7b583f93c16a27c0782524618a5a0b72f1f75a982826a71dbc45

  • SHA512

    b560c8ac78571a034e86244dee4e4ab15a2b14614c78fe98f7079809c5b6299148d1e2655c591c528e3099ae73d485bf3869c58e0995e95ce3b137455f948863

  • SSDEEP

    196608:Z7ntaQ6fLv8/gLy6ihNDAC2266Z0jbU8lqWV608KsN:Zztxa62ylNDACL03U8sW808j

Malware Config

Targets

    • Target

      a299c8c1f52f7b583f93c16a27c0782524618a5a0b72f1f75a982826a71dbc45

    • Size

      11.4MB

    • MD5

      e3ba0d2a5dea90d8fa68186361840f10

    • SHA1

      3990ff15349a66e6b01d55d1775a300d4d93d097

    • SHA256

      a299c8c1f52f7b583f93c16a27c0782524618a5a0b72f1f75a982826a71dbc45

    • SHA512

      b560c8ac78571a034e86244dee4e4ab15a2b14614c78fe98f7079809c5b6299148d1e2655c591c528e3099ae73d485bf3869c58e0995e95ce3b137455f948863

    • SSDEEP

      196608:Z7ntaQ6fLv8/gLy6ihNDAC2266Z0jbU8lqWV608KsN:Zztxa62ylNDACL03U8sW808j

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks