General

  • Target

    7516c84a016536e17d94740142f22e375d010a76b7610eddd12043b1676c6db4

  • Size

    1.4MB

  • Sample

    220130-r127esdbg8

  • MD5

    48dee0033baf8d606b2fbb649a6e4b71

  • SHA1

    fbd97a00132d02df575aba0b332d3febbad7aa75

  • SHA256

    7516c84a016536e17d94740142f22e375d010a76b7610eddd12043b1676c6db4

  • SHA512

    fafac3b39e12688a47a81d515f192b278a3a7212019f10b04992774768979000212b426d6d03a05de1905ce9dbca09b75f3a34def4c4e5265e054909dc0290eb

Score
8/10

Malware Config

Targets

    • Target

      7516c84a016536e17d94740142f22e375d010a76b7610eddd12043b1676c6db4

    • Size

      1.4MB

    • MD5

      48dee0033baf8d606b2fbb649a6e4b71

    • SHA1

      fbd97a00132d02df575aba0b332d3febbad7aa75

    • SHA256

      7516c84a016536e17d94740142f22e375d010a76b7610eddd12043b1676c6db4

    • SHA512

      fafac3b39e12688a47a81d515f192b278a3a7212019f10b04992774768979000212b426d6d03a05de1905ce9dbca09b75f3a34def4c4e5265e054909dc0290eb

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks