General

  • Target

    0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98

  • Size

    735KB

  • Sample

    241121-nlz7qs1emg

  • MD5

    5b76c7ea91e9c510ef26b05ee777b0af

  • SHA1

    633cc7d4c77a932de541a00f19136cd199935edc

  • SHA256

    0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98

  • SHA512

    b7cad74fbcaa80d07d2ff2bf33f835166ad0cbfa8ed6e71862196b633aabe26129fd066321bd57ee98396d13d05df5b450e493ee77c99be1659312f16145344c

  • SSDEEP

    12288:ZsaDPw1Qk89TmyyuR0UoNSoHBiWUE+z/FBUYAIxqiWp7VA0GAIbOdF:ZtLw9gTFb0soHBzd2CY3xqzL/

Score
8/10

Malware Config

Targets

    • Target

      0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98

    • Size

      735KB

    • MD5

      5b76c7ea91e9c510ef26b05ee777b0af

    • SHA1

      633cc7d4c77a932de541a00f19136cd199935edc

    • SHA256

      0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98

    • SHA512

      b7cad74fbcaa80d07d2ff2bf33f835166ad0cbfa8ed6e71862196b633aabe26129fd066321bd57ee98396d13d05df5b450e493ee77c99be1659312f16145344c

    • SSDEEP

      12288:ZsaDPw1Qk89TmyyuR0UoNSoHBiWUE+z/FBUYAIxqiWp7VA0GAIbOdF:ZtLw9gTFb0soHBzd2CY3xqzL/

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks