General
-
Target
codeXD.exe
-
Size
4.2MB
-
Sample
241229-v6pp3avnaz
-
MD5
c4d688c317c230ed80083b528290628a
-
SHA1
f31d5c315d60891fe0e31961dd8426df52c81720
-
SHA256
b8e8fcd1a357dd2810fbc8d0d33f956a61f922ac99cebd251cd049245b1efe56
-
SHA512
a24b5444bb5a06cc99c24a48f77c2fee50b3ea619e7cf0e69f363d907b84c2cb55f8d6e0e8090ca241efb2870c0c747f7c01ab18cea9295a9a14d4b3c4d99dd8
-
SSDEEP
98304:CEbiEkJL7F31bTfXC6K17PJ5fSq7U6+1HUTNU8zsQok4+Hrz:JkJtFHfW5PJ5Z7U6eUTNDdnLz
Static task
static1
Malware Config
Targets
-
-
Target
codeXD.exe
-
Size
4.2MB
-
MD5
c4d688c317c230ed80083b528290628a
-
SHA1
f31d5c315d60891fe0e31961dd8426df52c81720
-
SHA256
b8e8fcd1a357dd2810fbc8d0d33f956a61f922ac99cebd251cd049245b1efe56
-
SHA512
a24b5444bb5a06cc99c24a48f77c2fee50b3ea619e7cf0e69f363d907b84c2cb55f8d6e0e8090ca241efb2870c0c747f7c01ab18cea9295a9a14d4b3c4d99dd8
-
SSDEEP
98304:CEbiEkJL7F31bTfXC6K17PJ5fSq7U6+1HUTNU8zsQok4+Hrz:JkJtFHfW5PJ5Z7U6eUTNDdnLz
-
A potential corporate email address has been identified in the URL: Lorawght@600
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1