General

  • Target

    triage_dropped_file

  • Size

    413KB

  • Sample

    210722-7yjcn4rban

  • MD5

    1a0a3f41570af7287e65642c607a3746

  • SHA1

    30851f92c3e1cdd0a2bfb52a803e8eef93bdb669

  • SHA256

    bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b

  • SHA512

    f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28

Score
10/10

Malware Config

Targets

    • Target

      triage_dropped_file

    • Size

      413KB

    • MD5

      1a0a3f41570af7287e65642c607a3746

    • SHA1

      30851f92c3e1cdd0a2bfb52a803e8eef93bdb669

    • SHA256

      bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b

    • SHA512

      f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks