General

  • Target

    22aa6a954d6cc074e6ae159766c2e94d0b08b6cef6c635ea65c585bb4798b576

  • Size

    225KB

  • Sample

    220201-tpwxdahfh7

  • MD5

    8a896d59b70db30b4812f7299ea0dad2

  • SHA1

    e5a3e1203b16c2464e8b31fcc3fb867839846c94

  • SHA256

    22aa6a954d6cc074e6ae159766c2e94d0b08b6cef6c635ea65c585bb4798b576

  • SHA512

    075ce17a89e6309f6240b63c4c4114df7a3ffa28ee5d3a7212a66f5cfc7bebfe2bc8cac66a50f1309bc207da33646aa1e179efd6cd2e723757d4e95e6820cc49

Score
10/10

Malware Config

Targets

    • Target

      22aa6a954d6cc074e6ae159766c2e94d0b08b6cef6c635ea65c585bb4798b576

    • Size

      225KB

    • MD5

      8a896d59b70db30b4812f7299ea0dad2

    • SHA1

      e5a3e1203b16c2464e8b31fcc3fb867839846c94

    • SHA256

      22aa6a954d6cc074e6ae159766c2e94d0b08b6cef6c635ea65c585bb4798b576

    • SHA512

      075ce17a89e6309f6240b63c4c4114df7a3ffa28ee5d3a7212a66f5cfc7bebfe2bc8cac66a50f1309bc207da33646aa1e179efd6cd2e723757d4e95e6820cc49

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks