General

  • Target

    3FCBC07FC73317E5DC5EA20B22EDBC59.exe

  • Size

    1.5MB

  • Sample

    210505-3fsnvxglpn

  • MD5

    3fcbc07fc73317e5dc5ea20b22edbc59

  • SHA1

    820a1c1fcf8811a7d162b876122f8265378696fc

  • SHA256

    1759dd8f52a3e1e13c8b23adff5c8f2d0db25d9fe60abf25acb607103924e7a3

  • SHA512

    517d6121c38f27b90ffd98cc826c14b33c4447259aaf867bbbbd49b7da4f682f7a106dcea2bedfcd33cd228169339631ff36e162a93c99029299123d0c7da9da

Score
8/10

Malware Config

Targets

    • Target

      3FCBC07FC73317E5DC5EA20B22EDBC59.exe

    • Size

      1.5MB

    • MD5

      3fcbc07fc73317e5dc5ea20b22edbc59

    • SHA1

      820a1c1fcf8811a7d162b876122f8265378696fc

    • SHA256

      1759dd8f52a3e1e13c8b23adff5c8f2d0db25d9fe60abf25acb607103924e7a3

    • SHA512

      517d6121c38f27b90ffd98cc826c14b33c4447259aaf867bbbbd49b7da4f682f7a106dcea2bedfcd33cd228169339631ff36e162a93c99029299123d0c7da9da

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks