General

  • Target

    5438272df636e70bf68dbaabc55a4f60452a0eb56c5e17e426c74ce179908211

  • Size

    251KB

  • Sample

    220201-tme6vahfe3

  • MD5

    afb25753d579a42c015b6bd8bb2e241c

  • SHA1

    270f2e7bba1cffc15433bc91c5f7c43748bc27bb

  • SHA256

    5438272df636e70bf68dbaabc55a4f60452a0eb56c5e17e426c74ce179908211

  • SHA512

    cb7dd376d4a3f4315c1ea0973ae7e1bc3a7d3542a3daf3551a0046435434071b2a0cf81dbde7c756b921b8055a2a7e70aaf137473f1bd4b6f042009e8b998949

Score
10/10

Malware Config

Targets

    • Target

      5438272df636e70bf68dbaabc55a4f60452a0eb56c5e17e426c74ce179908211

    • Size

      251KB

    • MD5

      afb25753d579a42c015b6bd8bb2e241c

    • SHA1

      270f2e7bba1cffc15433bc91c5f7c43748bc27bb

    • SHA256

      5438272df636e70bf68dbaabc55a4f60452a0eb56c5e17e426c74ce179908211

    • SHA512

      cb7dd376d4a3f4315c1ea0973ae7e1bc3a7d3542a3daf3551a0046435434071b2a0cf81dbde7c756b921b8055a2a7e70aaf137473f1bd4b6f042009e8b998949

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

MITRE ATT&CK Matrix

Tasks