General

  • Target

    f3409c2f76b6f62ee8825da54c44673077a1d3bb050bed9a24b5169754a8073b.exe.vir

  • Size

    121.2MB

  • Sample

    241121-bjgldsxaqa

  • MD5

    70d8d97da1f076e1fdec3743bb684cd3

  • SHA1

    de173e4d535b5ddd1bb1c0dad5191ca2cf92a25a

  • SHA256

    f3409c2f76b6f62ee8825da54c44673077a1d3bb050bed9a24b5169754a8073b

  • SHA512

    e0d1406a69d17e16615d2c55906bd0bd7fa35b40a478badb8a283941714523881ca3df832e9af0a5792dfedf8e7242c05d595580c7556e9d102f538306593fa5

  • SSDEEP

    3145728:rAEAnnqnfyo/2oA6WC8GrZdqQvQp7Nr7a0gz2b:bZyo0YrZdqQk7Nr7ah

Malware Config

Targets

    • Target

      f3409c2f76b6f62ee8825da54c44673077a1d3bb050bed9a24b5169754a8073b.exe.vir

    • Size

      121.2MB

    • MD5

      70d8d97da1f076e1fdec3743bb684cd3

    • SHA1

      de173e4d535b5ddd1bb1c0dad5191ca2cf92a25a

    • SHA256

      f3409c2f76b6f62ee8825da54c44673077a1d3bb050bed9a24b5169754a8073b

    • SHA512

      e0d1406a69d17e16615d2c55906bd0bd7fa35b40a478badb8a283941714523881ca3df832e9af0a5792dfedf8e7242c05d595580c7556e9d102f538306593fa5

    • SSDEEP

      3145728:rAEAnnqnfyo/2oA6WC8GrZdqQvQp7Nr7a0gz2b:bZyo0YrZdqQk7Nr7ah

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks