General

  • Target

    80d72b63347f9fa70ac03fafcc46247b400ef2cbbb258f1bb55aa4981faf03fd

  • Size

    247KB

  • Sample

    220201-tk4reshfc3

  • MD5

    09e74e3455326976d15afa01d2cb9217

  • SHA1

    3ed469af986abb331dbc3af734406211ba278ae1

  • SHA256

    80d72b63347f9fa70ac03fafcc46247b400ef2cbbb258f1bb55aa4981faf03fd

  • SHA512

    aca18f2fc17d9342d743e8275369b799fb57f382e313f134c8c0022e4a1f7fbe684c0930866aabf87db000533e5eb8f88ee7a4f1abf0a5e9d870124f6fce9ac1

Score
10/10

Malware Config

Targets

    • Target

      80d72b63347f9fa70ac03fafcc46247b400ef2cbbb258f1bb55aa4981faf03fd

    • Size

      247KB

    • MD5

      09e74e3455326976d15afa01d2cb9217

    • SHA1

      3ed469af986abb331dbc3af734406211ba278ae1

    • SHA256

      80d72b63347f9fa70ac03fafcc46247b400ef2cbbb258f1bb55aa4981faf03fd

    • SHA512

      aca18f2fc17d9342d743e8275369b799fb57f382e313f134c8c0022e4a1f7fbe684c0930866aabf87db000533e5eb8f88ee7a4f1abf0a5e9d870124f6fce9ac1

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks