General

  • Target

    .

  • Size

    516KB

  • Sample

    241118-z647zawdjp

  • MD5

    7f799cf933e89834bb04bf92ec450bed

  • SHA1

    6fc882d74ab3c6a174597230ae62b8e03643dde6

  • SHA256

    ef82337fa50b97d58026e0476e9839f2ad0459b0b3011ad2aca49dee215dd1b4

  • SHA512

    f31c6ce9dc22c8573bd42902510ea3654c7324efde15759643b2a61feb3a29e698f3ecc20f05f39464259b576d0c48bc322dc9cd9d1e43bf0ff7dbd9ede02c1b

  • SSDEEP

    6144:Omu1uxFuxruxyuxtuxSuxyuxMuxnuxtuxIvhg:OluXuhukuPuIuAu+uFubu2hg

Malware Config

Targets

    • Target

      .

    • Size

      516KB

    • MD5

      7f799cf933e89834bb04bf92ec450bed

    • SHA1

      6fc882d74ab3c6a174597230ae62b8e03643dde6

    • SHA256

      ef82337fa50b97d58026e0476e9839f2ad0459b0b3011ad2aca49dee215dd1b4

    • SHA512

      f31c6ce9dc22c8573bd42902510ea3654c7324efde15759643b2a61feb3a29e698f3ecc20f05f39464259b576d0c48bc322dc9cd9d1e43bf0ff7dbd9ede02c1b

    • SSDEEP

      6144:Omu1uxFuxruxyuxtuxSuxyuxMuxnuxtuxIvhg:OluXuhukuPuIuAu+uFubu2hg

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Detected potential entity reuse from brand STEAM.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks