General

  • Target

    8a14d70433b5ec004e5295e1e8aef3ad406b80fa22eeeb8283edac706f1724d1

  • Size

    663KB

  • Sample

    220201-tkgxnaheh7

  • MD5

    2efd73c7c3a0451de763a434504923de

  • SHA1

    be9493e4d8b45851b540106e00899c7164f3c8bf

  • SHA256

    8a14d70433b5ec004e5295e1e8aef3ad406b80fa22eeeb8283edac706f1724d1

  • SHA512

    ce2da9111dcd5ce22c239b33df02ca35c1520bbe71a50265de17939326e3b90b533c12555a9a349b6caf9f093ddefedfabfe6755b52f6839a27e79c0c4ca5d13

Score
10/10

Malware Config

Targets

    • Target

      8a14d70433b5ec004e5295e1e8aef3ad406b80fa22eeeb8283edac706f1724d1

    • Size

      663KB

    • MD5

      2efd73c7c3a0451de763a434504923de

    • SHA1

      be9493e4d8b45851b540106e00899c7164f3c8bf

    • SHA256

      8a14d70433b5ec004e5295e1e8aef3ad406b80fa22eeeb8283edac706f1724d1

    • SHA512

      ce2da9111dcd5ce22c239b33df02ca35c1520bbe71a50265de17939326e3b90b533c12555a9a349b6caf9f093ddefedfabfe6755b52f6839a27e79c0c4ca5d13

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks