General

  • Target

    a510d491bf8504acb81327c42f0e8eefd912baaacada5b951070ecc06df32566

  • Size

    2.4MB

  • Sample

    220621-cegw2aggdq

  • MD5

    30cb615647f532aee704af8300d6ba8f

  • SHA1

    4929831b4e7532ac20ffdf755822d6194813db4e

  • SHA256

    a510d491bf8504acb81327c42f0e8eefd912baaacada5b951070ecc06df32566

  • SHA512

    cfa40f20bb0e133bce4ab4bcc456667bd697fe1cd9ae924c474e80a914a052c54d9bfc00ea141fadd121fa1c60e8c5ddd3e0bb0b1695a4d4fe1fc4015c96b449

Score
10/10

Malware Config

Targets

    • Target

      a510d491bf8504acb81327c42f0e8eefd912baaacada5b951070ecc06df32566

    • Size

      2.4MB

    • MD5

      30cb615647f532aee704af8300d6ba8f

    • SHA1

      4929831b4e7532ac20ffdf755822d6194813db4e

    • SHA256

      a510d491bf8504acb81327c42f0e8eefd912baaacada5b951070ecc06df32566

    • SHA512

      cfa40f20bb0e133bce4ab4bcc456667bd697fe1cd9ae924c474e80a914a052c54d9bfc00ea141fadd121fa1c60e8c5ddd3e0bb0b1695a4d4fe1fc4015c96b449

    Score
    10/10
    • Detected adobe phishing page

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks