General

  • Target

    76ff50ba7985bff5cb38ab864b73d928b9443e2de27395299efce9eeb755f59d

  • Size

    1.5MB

  • Sample

    210515-wmha9pxd4a

  • MD5

    617a46ddca3a3892911fd07aeee67b53

  • SHA1

    31235808d89ae59fedee3458e3e1a866d35230b0

  • SHA256

    76ff50ba7985bff5cb38ab864b73d928b9443e2de27395299efce9eeb755f59d

  • SHA512

    fd7b878c462b213eca14fab35b4b2a15ecae01f5d9b17a08e18e5da630e4cccbb8e67cfb0546b4ab0d8fa2483e19d0dba96d922e8f178d37a94586a39871e0c1

Malware Config

Targets

    • Target

      76ff50ba7985bff5cb38ab864b73d928b9443e2de27395299efce9eeb755f59d

    • Size

      1.5MB

    • MD5

      617a46ddca3a3892911fd07aeee67b53

    • SHA1

      31235808d89ae59fedee3458e3e1a866d35230b0

    • SHA256

      76ff50ba7985bff5cb38ab864b73d928b9443e2de27395299efce9eeb755f59d

    • SHA512

      fd7b878c462b213eca14fab35b4b2a15ecae01f5d9b17a08e18e5da630e4cccbb8e67cfb0546b4ab0d8fa2483e19d0dba96d922e8f178d37a94586a39871e0c1

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks