General

  • Target

    DEUDA POR CANCELAR_03D1.rar

  • Size

    3.0MB

  • Sample

    211203-tsz37scaa8

  • MD5

    5187ce0978edb36a7cb38fba079648d7

  • SHA1

    4c1ed3000b94eab113bd960847bf39ae05a45280

  • SHA256

    dc00e6e52640bbfa12f59cb48ec84fb658714a3e9aeed7952f2731cda6726fb3

  • SHA512

    78fd7ea3560a4d2d941adeb0e70af479a627805cd635ab40b28c2cc9a6a2b7a748157e5663e3e90d491c6462016c8c6fc6d73e028640891e110bc73bd2c82497

Score
8/10

Malware Config

Targets

    • Target

      DEUDA POR CANCELAR_03D1.rar

    • Size

      3.0MB

    • MD5

      5187ce0978edb36a7cb38fba079648d7

    • SHA1

      4c1ed3000b94eab113bd960847bf39ae05a45280

    • SHA256

      dc00e6e52640bbfa12f59cb48ec84fb658714a3e9aeed7952f2731cda6726fb3

    • SHA512

      78fd7ea3560a4d2d941adeb0e70af479a627805cd635ab40b28c2cc9a6a2b7a748157e5663e3e90d491c6462016c8c6fc6d73e028640891e110bc73bd2c82497

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks