General

  • Target

    81fc45c95bdb421257645b4ff91a6afc82201d3ffe570c059994d79ff1484f90.sample

  • Size

    340KB

  • Sample

    210726-nam11dt1j2

  • MD5

    ffeae4a391a1d5203bd04b4161557227

  • SHA1

    7c7013dd8def75c94828b40ffa139b6d89ec4683

  • SHA256

    81fc45c95bdb421257645b4ff91a6afc82201d3ffe570c059994d79ff1484f90

  • SHA512

    2621e4b60d5f962f9ddb2307f2fffe5d9e375a4872693f065f6e2a3fde4f4e8b7a4230493b7cb5a3f7dfe68a1ac3765ffc17bb7a6b543642640a64e661eaf967

Malware Config

Targets

    • Target

      81fc45c95bdb421257645b4ff91a6afc82201d3ffe570c059994d79ff1484f90.sample

    • Size

      340KB

    • MD5

      ffeae4a391a1d5203bd04b4161557227

    • SHA1

      7c7013dd8def75c94828b40ffa139b6d89ec4683

    • SHA256

      81fc45c95bdb421257645b4ff91a6afc82201d3ffe570c059994d79ff1484f90

    • SHA512

      2621e4b60d5f962f9ddb2307f2fffe5d9e375a4872693f065f6e2a3fde4f4e8b7a4230493b7cb5a3f7dfe68a1ac3765ffc17bb7a6b543642640a64e661eaf967

    • CryptoLocker

      Ransomware family with multiple variants.

    • suricata: ET MALWARE Zeus GameOver Possible DGA NXDOMAIN Responses

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks