Resubmissions

29-07-2021 08:36

210729-5h67qwvrd2 10

27-07-2021 14:54

210727-v3d6d2mxcs 10

General

  • Target

    iCoreBr.jpg

  • Size

    1.3MB

  • Sample

    210729-5h67qwvrd2

  • MD5

    132e6560ca121679635684e812586bba

  • SHA1

    6f48b7929e65aac27f3bf3cce24c7ad40624dc74

  • SHA256

    c882f778e40b276c90d467816deda7605d9955e4302aa6ab7467aeae3f155048

  • SHA512

    3c3fd439c29e36a2ef174f82c4df36c89a87bbc2e280753166bc25b14b6066fc6b0eff7101e4b301e51722271b76ebdb79dbf58a201a7a4c8bcb64e708e6a4a5

Score
10/10

Malware Config

Targets

    • Target

      iCoreBr.jpg

    • Size

      1.3MB

    • MD5

      132e6560ca121679635684e812586bba

    • SHA1

      6f48b7929e65aac27f3bf3cce24c7ad40624dc74

    • SHA256

      c882f778e40b276c90d467816deda7605d9955e4302aa6ab7467aeae3f155048

    • SHA512

      3c3fd439c29e36a2ef174f82c4df36c89a87bbc2e280753166bc25b14b6066fc6b0eff7101e4b301e51722271b76ebdb79dbf58a201a7a4c8bcb64e708e6a4a5

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks