General

  • Target

    d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample

  • Size

    362KB

  • Sample

    210726-9l2446gt66

  • MD5

    3921543c211364b4827c55aeeef5260c

  • SHA1

    4b7f71b8e7f228dbb0d296120b6f6f455d22248c

  • SHA256

    d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d

  • SHA512

    e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e

Malware Config

Targets

    • Target

      d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d.sample

    • Size

      362KB

    • MD5

      3921543c211364b4827c55aeeef5260c

    • SHA1

      4b7f71b8e7f228dbb0d296120b6f6f455d22248c

    • SHA256

      d828981e90be2089e64c4a72961e9bbe2522709c242a8839c36cc9e45818e08d

    • SHA512

      e50ca28538254b535256c1b2542a8d894b9177f3037508c3331197b5338fba609818e4a756c3fa9135c11df7c12aa22302d0e4336ba6b78858d10bb0e845221e

    • CryptoLocker

      Ransomware family with multiple variants.

    • suricata: ET MALWARE Zeus GameOver Possible DGA NXDOMAIN Responses

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks