General

  • Target

    bc35cf57e017aea5874d3b6f7d896c269e6d8af0b007bbd2b162e2b830400551

  • Size

    71KB

  • Sample

    210515-1qlw9xtp4j

  • MD5

    64554b9979e4a416276cc349e4ab5eb4

  • SHA1

    cca1062150d9276b18bd5c82cf8bdd07ac87ac1a

  • SHA256

    bc35cf57e017aea5874d3b6f7d896c269e6d8af0b007bbd2b162e2b830400551

  • SHA512

    07892a3edd51127d186fbd13130fba20ee8e610c943835121e3b1cf1181015b4570c738842bf7371c075fb10b346df0078bd4f8e12ba171c0ee55301222e4a87

Malware Config

Targets

    • Target

      bc35cf57e017aea5874d3b6f7d896c269e6d8af0b007bbd2b162e2b830400551

    • Size

      71KB

    • MD5

      64554b9979e4a416276cc349e4ab5eb4

    • SHA1

      cca1062150d9276b18bd5c82cf8bdd07ac87ac1a

    • SHA256

      bc35cf57e017aea5874d3b6f7d896c269e6d8af0b007bbd2b162e2b830400551

    • SHA512

      07892a3edd51127d186fbd13130fba20ee8e610c943835121e3b1cf1181015b4570c738842bf7371c075fb10b346df0078bd4f8e12ba171c0ee55301222e4a87

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks