General

  • Target

    be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd

  • Size

    828KB

  • Sample

    220523-3z6c8sdegl

  • MD5

    72700cb0d075d477bb06c4b939f9b3a6

  • SHA1

    856102b4864ec296f7ea50b607935da5f9a4e102

  • SHA256

    be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd

  • SHA512

    b39a4ba2dfb6fba8306cd115872721c6a185cc763dd13791154b3109242853bc921162e3533f9ba5cfe0d41f54774c4d03d1b91509772ba02dcf059adcd7eea7

Malware Config

Targets

    • Target

      be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd

    • Size

      828KB

    • MD5

      72700cb0d075d477bb06c4b939f9b3a6

    • SHA1

      856102b4864ec296f7ea50b607935da5f9a4e102

    • SHA256

      be94526611d6f5597ff276d439a5bad8c6b414607066e68cf2abb24651c674bd

    • SHA512

      b39a4ba2dfb6fba8306cd115872721c6a185cc763dd13791154b3109242853bc921162e3533f9ba5cfe0d41f54774c4d03d1b91509772ba02dcf059adcd7eea7

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks