General

  • Target

    ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c

  • Size

    272KB

  • Sample

    220201-tedytahea2

  • MD5

    889b1519c8fcddde0ae48ba09e87e92e

  • SHA1

    5cb0d7ca31f58ec6c2f84d681759d311bc8ecd9e

  • SHA256

    ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c

  • SHA512

    db85228fec02e9f360ef003df12800ef48aac75d84a19f19325db83516424e3870909f4a79b5ff0f793d145c34cd96a17b455b6d9a3f17ca1338bcd853dc8a84

Score
10/10

Malware Config

Targets

    • Target

      ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c

    • Size

      272KB

    • MD5

      889b1519c8fcddde0ae48ba09e87e92e

    • SHA1

      5cb0d7ca31f58ec6c2f84d681759d311bc8ecd9e

    • SHA256

      ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c

    • SHA512

      db85228fec02e9f360ef003df12800ef48aac75d84a19f19325db83516424e3870909f4a79b5ff0f793d145c34cd96a17b455b6d9a3f17ca1338bcd853dc8a84

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks