General

  • Target

    rtdt.bin

  • Size

    324KB

  • Sample

    220320-pm3jxsbhg6

  • MD5

    f1df801459853f42662c0f947518d3e7

  • SHA1

    15e292ab8c863f2ba97244ed3f6cb226980580e9

  • SHA256

    b02e02ff9b225ad1d2d295800005675fbf2dacd2899b5b939e1070aa2de623e1

  • SHA512

    a06911c0e062dc0d6d8803ea4a0332ea8097839d03f3a382b104e78c82d57685aa199033c582936823115253a65f0883e4d0b76c8988d7319e5bed29f9618d13

Score
10/10

Malware Config

Targets

    • Target

      rtdt.bin

    • Size

      324KB

    • MD5

      f1df801459853f42662c0f947518d3e7

    • SHA1

      15e292ab8c863f2ba97244ed3f6cb226980580e9

    • SHA256

      b02e02ff9b225ad1d2d295800005675fbf2dacd2899b5b939e1070aa2de623e1

    • SHA512

      a06911c0e062dc0d6d8803ea4a0332ea8097839d03f3a382b104e78c82d57685aa199033c582936823115253a65f0883e4d0b76c8988d7319e5bed29f9618d13

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks