General

  • Target

    4fafcbd5009694e420fe85fa39c6c3f85fbb6c3ef871f6e9e1a232453742e475

  • Size

    211KB

  • Sample

    220201-tmrvmshfe9

  • MD5

    8c3ac0c9bb5e5341ecd016c28b8d836d

  • SHA1

    f4c7a87acf54068cc623136402d03dfc21e53220

  • SHA256

    4fafcbd5009694e420fe85fa39c6c3f85fbb6c3ef871f6e9e1a232453742e475

  • SHA512

    ba197ff3d864b6578fbd64960083c3a79f2830ac3957974f7a4b99624ace085ecdbb3e60fd0e8011f1ada71e3362311504cdfe1a2dab868bc7b9d545fdf1c222

Score
10/10

Malware Config

Targets

    • Target

      4fafcbd5009694e420fe85fa39c6c3f85fbb6c3ef871f6e9e1a232453742e475

    • Size

      211KB

    • MD5

      8c3ac0c9bb5e5341ecd016c28b8d836d

    • SHA1

      f4c7a87acf54068cc623136402d03dfc21e53220

    • SHA256

      4fafcbd5009694e420fe85fa39c6c3f85fbb6c3ef871f6e9e1a232453742e475

    • SHA512

      ba197ff3d864b6578fbd64960083c3a79f2830ac3957974f7a4b99624ace085ecdbb3e60fd0e8011f1ada71e3362311504cdfe1a2dab868bc7b9d545fdf1c222

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

MITRE ATT&CK Matrix

Tasks