General

  • Target

    c95d2caed83ec5a321a4b607947f103af193db95e920a426fa5ff339eebef19a

  • Size

    5.3MB

  • Sample

    210514-l7wtqg4yex

  • MD5

    71fc21df40770009ae3c7b3b565831e3

  • SHA1

    7d518f1e7ebf3b45f7f6f8d63262bf48e202783f

  • SHA256

    c95d2caed83ec5a321a4b607947f103af193db95e920a426fa5ff339eebef19a

  • SHA512

    3598da724fb6590da6c2831de491944ec1b6cd4062f2223dd41bf20e0c7708ac3527cbae6d0172d818c2f3b85cf3c29c148562b316e122078dd696925f8f76cd

Score
10/10

Malware Config

Targets

    • Target

      c95d2caed83ec5a321a4b607947f103af193db95e920a426fa5ff339eebef19a

    • Size

      5.3MB

    • MD5

      71fc21df40770009ae3c7b3b565831e3

    • SHA1

      7d518f1e7ebf3b45f7f6f8d63262bf48e202783f

    • SHA256

      c95d2caed83ec5a321a4b607947f103af193db95e920a426fa5ff339eebef19a

    • SHA512

      3598da724fb6590da6c2831de491944ec1b6cd4062f2223dd41bf20e0c7708ac3527cbae6d0172d818c2f3b85cf3c29c148562b316e122078dd696925f8f76cd

    Score
    10/10
    • ObliqueRAT

      Remote Access Trojan discovered in early 2020.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks