General

  • Target

    A4496847096F3B16C8CC2E743E48DABB687480F096384.exe

  • Size

    146KB

  • Sample

    210926-vfqvfafafm

  • MD5

    d35bddd3a36c7f33e086db7464c817a4

  • SHA1

    9e05674466f0935a5b17031a2278f64809878033

  • SHA256

    a4496847096f3b16c8cc2e743e48dabb687480f096384605f8601aa23dd05a8e

  • SHA512

    423728567736c18ba050bc04116bb9a8615c5a24e89b9f5cc2d815ce778eaaedf17118814e82d5c804fcf2b0fd1bb3aa8e333588b3712ddb690395816752a4e1

Score
10/10

Malware Config

Targets

    • Target

      A4496847096F3B16C8CC2E743E48DABB687480F096384.exe

    • Size

      146KB

    • MD5

      d35bddd3a36c7f33e086db7464c817a4

    • SHA1

      9e05674466f0935a5b17031a2278f64809878033

    • SHA256

      a4496847096f3b16c8cc2e743e48dabb687480f096384605f8601aa23dd05a8e

    • SHA512

      423728567736c18ba050bc04116bb9a8615c5a24e89b9f5cc2d815ce778eaaedf17118814e82d5c804fcf2b0fd1bb3aa8e333588b3712ddb690395816752a4e1

    Score
    10/10
    • suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks