General

  • Target

    d5fce595b6cc51ed68e3090b624c716d.exe

  • Size

    1.2MB

  • Sample

    211206-jftesadedn

  • MD5

    d5fce595b6cc51ed68e3090b624c716d

  • SHA1

    49d091f52156fd2f7401026fc923f3d962326ce9

  • SHA256

    4b89c6621588d5974b419f6aa7610ac8df584564a52a8555d32e190bc4f089f9

  • SHA512

    55d849fa1de305af3e62597401f75ca771f7f720b53e700ea4d660445ba46fd5309138592d51be929cb3bf8a76d795d71ba95c920029eacf64a80651f9b8f84b

Score
8/10

Malware Config

Targets

    • Target

      d5fce595b6cc51ed68e3090b624c716d.exe

    • Size

      1.2MB

    • MD5

      d5fce595b6cc51ed68e3090b624c716d

    • SHA1

      49d091f52156fd2f7401026fc923f3d962326ce9

    • SHA256

      4b89c6621588d5974b419f6aa7610ac8df584564a52a8555d32e190bc4f089f9

    • SHA512

      55d849fa1de305af3e62597401f75ca771f7f720b53e700ea4d660445ba46fd5309138592d51be929cb3bf8a76d795d71ba95c920029eacf64a80651f9b8f84b

    Score
    8/10
    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks