General

  • Target

    264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf

  • Size

    381KB

  • Sample

    220616-kvq4msecb8

  • MD5

    b17b80898eedfe9d51ac5f8da1b55a08

  • SHA1

    1227c764f46482f5e30e5a53433f45cb1a7eabdb

  • SHA256

    264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf

  • SHA512

    e5afaf0e885efaf44d391bc63c46d97611af1119f5979f0f06ae109afe042af91944cdbd49ed6c84069f262ee8a5882d2450b1fcd929c6b61714665472192750

Score
10/10

Malware Config

Targets

    • Target

      264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf

    • Size

      381KB

    • MD5

      b17b80898eedfe9d51ac5f8da1b55a08

    • SHA1

      1227c764f46482f5e30e5a53433f45cb1a7eabdb

    • SHA256

      264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf

    • SHA512

      e5afaf0e885efaf44d391bc63c46d97611af1119f5979f0f06ae109afe042af91944cdbd49ed6c84069f262ee8a5882d2450b1fcd929c6b61714665472192750

    Score
    10/10
    • Detects PlugX Payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • suricata: ET MALWARE PlugX CnC Beacon

      suricata: ET MALWARE PlugX CnC Beacon

    • suricata: ET MALWARE PlugX/Destory HTTP traffic

      suricata: ET MALWARE PlugX/Destory HTTP traffic

    • suricata: ET MALWARE Possible PlugX Common Header Struct

      suricata: ET MALWARE Possible PlugX Common Header Struct

    • suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2

      suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks