General

  • Target

    1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d.exe

  • Size

    703KB

  • Sample

    241009-gzslgs1dqf

  • MD5

    79352e18cf7cccead2e377bfa01ff274

  • SHA1

    4819ae220c6b1f0c510a67e84c56d6caba21801a

  • SHA256

    1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d

  • SHA512

    fe8f7524fb90592a971aea0c5fcd16164773f78e39687d109e00eca0d03e4cac814f9f27cd286556dfbc2f0aa46d253aabd5b2a8a0d1ab33037432faa029a62e

  • SSDEEP

    12288:1OSQt+Z2v21fza2exTt+OCdsbtf1lVfKeo64m4a8xmskO28iJbMS8FCuSJX6Cfdf:10t+Z2eMx0NWxf1lVfKF93xxmsoJ6FCB

Score
8/10

Malware Config

Targets

    • Target

      1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d.exe

    • Size

      703KB

    • MD5

      79352e18cf7cccead2e377bfa01ff274

    • SHA1

      4819ae220c6b1f0c510a67e84c56d6caba21801a

    • SHA256

      1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d

    • SHA512

      fe8f7524fb90592a971aea0c5fcd16164773f78e39687d109e00eca0d03e4cac814f9f27cd286556dfbc2f0aa46d253aabd5b2a8a0d1ab33037432faa029a62e

    • SSDEEP

      12288:1OSQt+Z2v21fza2exTt+OCdsbtf1lVfKeo64m4a8xmskO28iJbMS8FCuSJX6Cfdf:10t+Z2eMx0NWxf1lVfKF93xxmsoJ6FCB

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks