General

  • Target

    fa35e20372326e5c1e12607df198b5c4.exe

  • Size

    1.4MB

  • Sample

    211202-tj34haddc7

  • MD5

    fa35e20372326e5c1e12607df198b5c4

  • SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

  • SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

  • SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

Score
8/10

Malware Config

Targets

    • Target

      fa35e20372326e5c1e12607df198b5c4.exe

    • Size

      1.4MB

    • MD5

      fa35e20372326e5c1e12607df198b5c4

    • SHA1

      a022779cbf0fca54ef969c8a86be95083f9e128d

    • SHA256

      697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    • SHA512

      c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

    Score
    8/10
    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks