General

  • Target

    sample

  • Size

    807KB

  • Sample

    241117-v8hpjavfkj

  • MD5

    5d87fd1e838fcbebd8f59a5ee4459f43

  • SHA1

    90b9b5eb74e6bb69daf0d0e41e03fdaaa5dfee6b

  • SHA256

    327ad4d30b5753ad6fc8fae90614cb09134d110cb0b106fb2aaaf55b378dfaaa

  • SHA512

    b26d6505fca27c95e3fa8f9ef6c5899e9b672373265dc33e862547db0d814b8d79701a7bc502c9edb3412d2905f5fb512a1033d8d96f8e0eed5423661f3f299b

  • SSDEEP

    12288:y6oMYOGLgXC8MbC/V8s0iId76Sqih1s1mIv4vyXezfSe9cOTeUovR8B6dUlT48e1:y6G2UjTbtTleco

Malware Config

Targets

    • Target

      sample

    • Size

      807KB

    • MD5

      5d87fd1e838fcbebd8f59a5ee4459f43

    • SHA1

      90b9b5eb74e6bb69daf0d0e41e03fdaaa5dfee6b

    • SHA256

      327ad4d30b5753ad6fc8fae90614cb09134d110cb0b106fb2aaaf55b378dfaaa

    • SHA512

      b26d6505fca27c95e3fa8f9ef6c5899e9b672373265dc33e862547db0d814b8d79701a7bc502c9edb3412d2905f5fb512a1033d8d96f8e0eed5423661f3f299b

    • SSDEEP

      12288:y6oMYOGLgXC8MbC/V8s0iId76Sqih1s1mIv4vyXezfSe9cOTeUovR8B6dUlT48e1:y6G2UjTbtTleco

    • Detected google phishing page

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: Montserratwght@300

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand MICROSOFT.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks