General

  • Target

    b47e91705956e63797dae9eb1719cb4cf02e381cdbbcef5ed05c3215d5010e1f

  • Size

    320KB

  • Sample

    220201-thmp5ahef5

  • MD5

    dd23ff94d2d7accd59115de6d2e88715

  • SHA1

    1802ad465d71e054ef0dff23ed608fe4813536af

  • SHA256

    b47e91705956e63797dae9eb1719cb4cf02e381cdbbcef5ed05c3215d5010e1f

  • SHA512

    c67379a4a06702c9515fa53c0699c8a9d1d62d53a5fc53bc9c0e31a632afee30a4fcd71d6aedba41a768cafcfdefd77c38ada83db8aeee824ecffe7fa0839ac6

Score
10/10

Malware Config

Targets

    • Target

      b47e91705956e63797dae9eb1719cb4cf02e381cdbbcef5ed05c3215d5010e1f

    • Size

      320KB

    • MD5

      dd23ff94d2d7accd59115de6d2e88715

    • SHA1

      1802ad465d71e054ef0dff23ed608fe4813536af

    • SHA256

      b47e91705956e63797dae9eb1719cb4cf02e381cdbbcef5ed05c3215d5010e1f

    • SHA512

      c67379a4a06702c9515fa53c0699c8a9d1d62d53a5fc53bc9c0e31a632afee30a4fcd71d6aedba41a768cafcfdefd77c38ada83db8aeee824ecffe7fa0839ac6

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks