General

  • Target

    6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample

  • Size

    360KB

  • Sample

    210726-s9azdqtzks

  • MD5

    354f7ec15741db7fcdfe7b158c14dfaa

  • SHA1

    1265f62cb1bf781baaf5161e8b2fcd40a4026747

  • SHA256

    6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c

  • SHA512

    c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227

Malware Config

Targets

    • Target

      6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample

    • Size

      360KB

    • MD5

      354f7ec15741db7fcdfe7b158c14dfaa

    • SHA1

      1265f62cb1bf781baaf5161e8b2fcd40a4026747

    • SHA256

      6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c

    • SHA512

      c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227

    • CryptoLocker

      Ransomware family with multiple variants.

    • suricata: ET MALWARE Zeus GameOver Possible DGA NXDOMAIN Responses

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks