General

  • Target

    app.exe

  • Size

    1.2MB

  • Sample

    241009-j51kdssakb

  • MD5

    58ba20a38c3042d6a13dfec3c561cfbd

  • SHA1

    ea3a47e6a46b990f6046bd77b96e9d42bdd3a55f

  • SHA256

    ae1ff3a27a9e826de5b69d0a8c54bb8751daed10bdd8ac4dd04f2539877b0db1

  • SHA512

    833315c7ad0159193f49d46a7b490458725bb230d4b048ea24cc60562f1cfa26f6262c42882d0970dc0c4bd3eec8198730fc7541b6dd48dbb4132341259328ed

  • SSDEEP

    24576:Lrr/9x2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpIT1:LH+zxbUJndWeMln8FrmXmSmaIT1

Malware Config

Targets

    • Target

      app.exe

    • Size

      1.2MB

    • MD5

      58ba20a38c3042d6a13dfec3c561cfbd

    • SHA1

      ea3a47e6a46b990f6046bd77b96e9d42bdd3a55f

    • SHA256

      ae1ff3a27a9e826de5b69d0a8c54bb8751daed10bdd8ac4dd04f2539877b0db1

    • SHA512

      833315c7ad0159193f49d46a7b490458725bb230d4b048ea24cc60562f1cfa26f6262c42882d0970dc0c4bd3eec8198730fc7541b6dd48dbb4132341259328ed

    • SSDEEP

      24576:Lrr/9x2rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmzpIT1:LH+zxbUJndWeMln8FrmXmSmaIT1

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Network Share Discovery

      Attempt to gather information on host network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks