General

  • Target

    2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4

  • Size

    88KB

  • Sample

    220124-f8ycnacgd4

  • MD5

    5a6d034b9f656bd60cc29688d2eba618

  • SHA1

    83706ddaa5ea5ee2cfff54b7c809458a39163a7a

  • SHA256

    2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4

  • SHA512

    525a2cb4470e1a24bd2ed99df352565bee3f95124cb4221244d943fe99a65738991f037fcdf7040d1a76b6b9f96bf14674e196e7411666161f4e5ebe333e1b01

Score
10/10

Malware Config

Targets

    • Target

      2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4

    • Size

      88KB

    • MD5

      5a6d034b9f656bd60cc29688d2eba618

    • SHA1

      83706ddaa5ea5ee2cfff54b7c809458a39163a7a

    • SHA256

      2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4

    • SHA512

      525a2cb4470e1a24bd2ed99df352565bee3f95124cb4221244d943fe99a65738991f037fcdf7040d1a76b6b9f96bf14674e196e7411666161f4e5ebe333e1b01

    Score
    10/10
    • GoldDragon

      GoldDragon is a second-stage backdoor attributed to Kimsuky.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks