General

  • Target

    66b096816cb209f540e2974988c0d7b82487c3e52041a2d44cbe160c30dbde4d.sample

  • Size

    96KB

  • Sample

    210726-qh4cxxj89n

  • MD5

    5b17b33e215846830ad09ec3d71287a1

  • SHA1

    f4442ff97904eea16df41b24897df7b363d89bb8

  • SHA256

    66b096816cb209f540e2974988c0d7b82487c3e52041a2d44cbe160c30dbde4d

  • SHA512

    aab7c6b777f23fb4a5412af4b4b25bb45421b2f1bea3aece16d22597dd09743d35d9627484c668d359df6147f2b75bb8fd6e35317e16197ef3cb7940dfcda6f8

Score
8/10

Malware Config

Targets

    • Target

      66b096816cb209f540e2974988c0d7b82487c3e52041a2d44cbe160c30dbde4d.sample

    • Size

      96KB

    • MD5

      5b17b33e215846830ad09ec3d71287a1

    • SHA1

      f4442ff97904eea16df41b24897df7b363d89bb8

    • SHA256

      66b096816cb209f540e2974988c0d7b82487c3e52041a2d44cbe160c30dbde4d

    • SHA512

      aab7c6b777f23fb4a5412af4b4b25bb45421b2f1bea3aece16d22597dd09743d35d9627484c668d359df6147f2b75bb8fd6e35317e16197ef3cb7940dfcda6f8

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks