General

  • Target

    25bfe1bd30bbe5100498ed74eb413168a3740cb03a6cca489a88324f20b71c0f

  • Size

    793KB

  • Sample

    220201-tpps3ahfh4

  • MD5

    2914c01e554735865fed46a6a03b0e1e

  • SHA1

    7b55cd0792c35d4d44459afc61de68893ab51a23

  • SHA256

    25bfe1bd30bbe5100498ed74eb413168a3740cb03a6cca489a88324f20b71c0f

  • SHA512

    8150810bcd277b8605b931ebb6581d409dab551ec6e9a8474ed8623413631843c634e3aec6f182032233c577bf2a086b1fe6b56e007b90178fffa1455bf89680

Score
10/10

Malware Config

Targets

    • Target

      25bfe1bd30bbe5100498ed74eb413168a3740cb03a6cca489a88324f20b71c0f

    • Size

      793KB

    • MD5

      2914c01e554735865fed46a6a03b0e1e

    • SHA1

      7b55cd0792c35d4d44459afc61de68893ab51a23

    • SHA256

      25bfe1bd30bbe5100498ed74eb413168a3740cb03a6cca489a88324f20b71c0f

    • SHA512

      8150810bcd277b8605b931ebb6581d409dab551ec6e9a8474ed8623413631843c634e3aec6f182032233c577bf2a086b1fe6b56e007b90178fffa1455bf89680

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks