General

  • Target

    ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610

  • Size

    713KB

  • Sample

    220520-p3xnlscda5

  • MD5

    5c9d5674d31ac4c6687372fd02bb1f57

  • SHA1

    7fcc5bdad26e37f6933c60b8c3b73401bc301ee2

  • SHA256

    ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610

  • SHA512

    6030b3cb6733d305ccae5f1f33917b6dc92a6b9cb0aa6260e3d5c05c4de9b668799306916f575b96d04c154850c3c53588190b211b6ef4c9c14650716c2e1b29

Malware Config

Targets

    • Target

      ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610

    • Size

      713KB

    • MD5

      5c9d5674d31ac4c6687372fd02bb1f57

    • SHA1

      7fcc5bdad26e37f6933c60b8c3b73401bc301ee2

    • SHA256

      ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610

    • SHA512

      6030b3cb6733d305ccae5f1f33917b6dc92a6b9cb0aa6260e3d5c05c4de9b668799306916f575b96d04c154850c3c53588190b211b6ef4c9c14650716c2e1b29

    Score
    10/10
    • suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

      suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks