General

  • Target

    4264e428e96376609462b8339b93c829b0b506784ab20c8561416aff2ca1f0c3

  • Size

    254KB

  • Sample

    220201-tnmbjshff9

  • MD5

    6305ce6c63eee30772f7ecf17e135f5e

  • SHA1

    de9f69b748594d106118102523fb0f3e239d355b

  • SHA256

    4264e428e96376609462b8339b93c829b0b506784ab20c8561416aff2ca1f0c3

  • SHA512

    a279dea23978160f1acaab56cd9f7d753fa8a7eced50a6761a41b9319df8e2e761513d268931e4df387b7549eca092973ad68cb594740c04ea945a1d034a1b1a

Score
10/10

Malware Config

Targets

    • Target

      4264e428e96376609462b8339b93c829b0b506784ab20c8561416aff2ca1f0c3

    • Size

      254KB

    • MD5

      6305ce6c63eee30772f7ecf17e135f5e

    • SHA1

      de9f69b748594d106118102523fb0f3e239d355b

    • SHA256

      4264e428e96376609462b8339b93c829b0b506784ab20c8561416aff2ca1f0c3

    • SHA512

      a279dea23978160f1acaab56cd9f7d753fa8a7eced50a6761a41b9319df8e2e761513d268931e4df387b7549eca092973ad68cb594740c04ea945a1d034a1b1a

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks