General

  • Target

    2454c23d65ec209d62a845ea8c846d4ca5b96739080681d9b4c51f1e443737c2

  • Size

    1.7MB

  • Sample

    211208-3hzt5abcbr

  • MD5

    a3b33038696c8613e65d64d82e553a06

  • SHA1

    f42e45db983dbf6066c33da73637c081b903e4d5

  • SHA256

    2454c23d65ec209d62a845ea8c846d4ca5b96739080681d9b4c51f1e443737c2

  • SHA512

    fe49aec2b840c4cc2524eb90e789c59e44be5101ee6501aa224c87fb80e4f559d2205984ab292d70730bc3fef382f5632cce4960b5aafeeb245818b40a1a7954

Score
8/10
upx

Malware Config

Targets

    • Target

      2454c23d65ec209d62a845ea8c846d4ca5b96739080681d9b4c51f1e443737c2

    • Size

      1.7MB

    • MD5

      a3b33038696c8613e65d64d82e553a06

    • SHA1

      f42e45db983dbf6066c33da73637c081b903e4d5

    • SHA256

      2454c23d65ec209d62a845ea8c846d4ca5b96739080681d9b4c51f1e443737c2

    • SHA512

      fe49aec2b840c4cc2524eb90e789c59e44be5101ee6501aa224c87fb80e4f559d2205984ab292d70730bc3fef382f5632cce4960b5aafeeb245818b40a1a7954

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks