General

  • Target

    5b07369ada0a27d3259fd9523752b0a64fd4ebf21453ed7a2c442e57e5806445

  • Size

    228KB

  • Sample

    220201-tmdb9ahfe2

  • MD5

    0d80b05373f9bbfb1472ab89559b2074

  • SHA1

    590f3731198b669139bd019ff28ee28e2b3b94e7

  • SHA256

    5b07369ada0a27d3259fd9523752b0a64fd4ebf21453ed7a2c442e57e5806445

  • SHA512

    43237bd78c0af4c829c2fb3a6513443465418d74004747528d1beb79cef4954c6acab4127528cb1166e9914803e5b9cbca8aaaa578a2a68f26bd507c5d0cf4d0

Score
10/10

Malware Config

Targets

    • Target

      5b07369ada0a27d3259fd9523752b0a64fd4ebf21453ed7a2c442e57e5806445

    • Size

      228KB

    • MD5

      0d80b05373f9bbfb1472ab89559b2074

    • SHA1

      590f3731198b669139bd019ff28ee28e2b3b94e7

    • SHA256

      5b07369ada0a27d3259fd9523752b0a64fd4ebf21453ed7a2c442e57e5806445

    • SHA512

      43237bd78c0af4c829c2fb3a6513443465418d74004747528d1beb79cef4954c6acab4127528cb1166e9914803e5b9cbca8aaaa578a2a68f26bd507c5d0cf4d0

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks