General

  • Target

    codeXD.exe

  • Size

    4.2MB

  • Sample

    241229-v6pp3avnaz

  • MD5

    c4d688c317c230ed80083b528290628a

  • SHA1

    f31d5c315d60891fe0e31961dd8426df52c81720

  • SHA256

    b8e8fcd1a357dd2810fbc8d0d33f956a61f922ac99cebd251cd049245b1efe56

  • SHA512

    a24b5444bb5a06cc99c24a48f77c2fee50b3ea619e7cf0e69f363d907b84c2cb55f8d6e0e8090ca241efb2870c0c747f7c01ab18cea9295a9a14d4b3c4d99dd8

  • SSDEEP

    98304:CEbiEkJL7F31bTfXC6K17PJ5fSq7U6+1HUTNU8zsQok4+Hrz:JkJtFHfW5PJ5Z7U6eUTNDdnLz

Malware Config

Targets

    • Target

      codeXD.exe

    • Size

      4.2MB

    • MD5

      c4d688c317c230ed80083b528290628a

    • SHA1

      f31d5c315d60891fe0e31961dd8426df52c81720

    • SHA256

      b8e8fcd1a357dd2810fbc8d0d33f956a61f922ac99cebd251cd049245b1efe56

    • SHA512

      a24b5444bb5a06cc99c24a48f77c2fee50b3ea619e7cf0e69f363d907b84c2cb55f8d6e0e8090ca241efb2870c0c747f7c01ab18cea9295a9a14d4b3c4d99dd8

    • SSDEEP

      98304:CEbiEkJL7F31bTfXC6K17PJ5fSq7U6+1HUTNU8zsQok4+Hrz:JkJtFHfW5PJ5Z7U6eUTNDdnLz

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • A potential corporate email address has been identified in the URL: Lorawght@600

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Detected potential entity reuse from brand MICROSOFT.

MITRE ATT&CK Enterprise v15

Tasks