General

  • Target

    4a3faf2bccb773086fb34e7c486ada09f0d2ec47e5a06c684130c153d4392ddd

  • Size

    226KB

  • Sample

    220201-tm529shff4

  • MD5

    8d3463ce25e44da97f27391660bc3a21

  • SHA1

    090b9ccb42235b2388cc39bf96712d9d53680843

  • SHA256

    4a3faf2bccb773086fb34e7c486ada09f0d2ec47e5a06c684130c153d4392ddd

  • SHA512

    21c75441fa4e8cdb586fe5273c58bf2b3f98c884ef1dfbab947923ae64e03f45d34be38022f9b7e48405647bff25904a9422455a81ce93b3e2a810e1362b6c21

Score
10/10

Malware Config

Targets

    • Target

      4a3faf2bccb773086fb34e7c486ada09f0d2ec47e5a06c684130c153d4392ddd

    • Size

      226KB

    • MD5

      8d3463ce25e44da97f27391660bc3a21

    • SHA1

      090b9ccb42235b2388cc39bf96712d9d53680843

    • SHA256

      4a3faf2bccb773086fb34e7c486ada09f0d2ec47e5a06c684130c153d4392ddd

    • SHA512

      21c75441fa4e8cdb586fe5273c58bf2b3f98c884ef1dfbab947923ae64e03f45d34be38022f9b7e48405647bff25904a9422455a81ce93b3e2a810e1362b6c21

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

MITRE ATT&CK Matrix

Tasks