General

  • Target

    02e4e13a4471879c5b3943e1790af545099d8ac34a1e6bb50095dcb480f3376c

  • Size

    227KB

  • Sample

    220201-trqs5shgb3

  • MD5

    f7c32dc31673cb601a400a3fdca604f5

  • SHA1

    cb535c7ed2fb29af50764347fbc88d49a1fda215

  • SHA256

    02e4e13a4471879c5b3943e1790af545099d8ac34a1e6bb50095dcb480f3376c

  • SHA512

    3059cb405088843bbc7d9036ce50b3bb0479686aee940054a8f03000dc8386f15a36f31f55db6e15619a2ca088cbf94db9beb4776d5a810a75bd4eefd2d31ddd

Score
10/10

Malware Config

Targets

    • Target

      02e4e13a4471879c5b3943e1790af545099d8ac34a1e6bb50095dcb480f3376c

    • Size

      227KB

    • MD5

      f7c32dc31673cb601a400a3fdca604f5

    • SHA1

      cb535c7ed2fb29af50764347fbc88d49a1fda215

    • SHA256

      02e4e13a4471879c5b3943e1790af545099d8ac34a1e6bb50095dcb480f3376c

    • SHA512

      3059cb405088843bbc7d9036ce50b3bb0479686aee940054a8f03000dc8386f15a36f31f55db6e15619a2ca088cbf94db9beb4776d5a810a75bd4eefd2d31ddd

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks