General

  • Target

    sample

  • Size

    59KB

  • Sample

    241013-qcva8sxgrb

  • MD5

    cb184c98c7e165aea2498a5798f349c0

  • SHA1

    aee153d4934061f000da114af94f1e2719a9a34d

  • SHA256

    fa5381ec8f7278956a950b55a931339986904742d9a5d44db5e852b772e2a101

  • SHA512

    d30451100f8b5e096ebda6e1c6242292f7be74ec95ad265435c81935dc5d3a9b38b28dfdce1a9cd23a122739d1b3e2a3619037c737b8b8d2acbe37a9d827907e

  • SSDEEP

    1536:xtH82dJ6GW+48VH8w+8qtMCtDR1Ef9ukDE:/H82eGc8qtM6DR10UkDE

Score
8/10

Malware Config

Targets

    • Target

      sample

    • Size

      59KB

    • MD5

      cb184c98c7e165aea2498a5798f349c0

    • SHA1

      aee153d4934061f000da114af94f1e2719a9a34d

    • SHA256

      fa5381ec8f7278956a950b55a931339986904742d9a5d44db5e852b772e2a101

    • SHA512

      d30451100f8b5e096ebda6e1c6242292f7be74ec95ad265435c81935dc5d3a9b38b28dfdce1a9cd23a122739d1b3e2a3619037c737b8b8d2acbe37a9d827907e

    • SSDEEP

      1536:xtH82dJ6GW+48VH8w+8qtMCtDR1Ef9ukDE:/H82eGc8qtM6DR10UkDE

    Score
    8/10
    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks