General

  • Target

    ipv.etl

  • Size

    2.3MB

  • Sample

    220623-j3tztsccem

  • MD5

    288543bf797f4be5b66385aec5ed2e4f

  • SHA1

    9ba54110203664c8b38cd842fc2cac0d60082a2d

  • SHA256

    b3bf89c17580cab05931970666807dc24c18e6d22d86bfe83211ccdd86a0054a

  • SHA512

    650f13ad1780a478d0d1586858f9e6c0af010ed087850956fc61903e609604ecb07b75a1c0ff5191bcb46fc3c3f718f84f646d54b207467ef9017981813c28bc

Score
10/10

Malware Config

Targets

    • Target

      MoUseCore.exe

    • Size

      620.8MB

    • MD5

      ed5c36d81655a1744c7a8f710ed4a497

    • SHA1

      cc08e68ae40c0a524b05e4936db86480b72d6631

    • SHA256

      192d5612ca93f86b198fa39f05e33edca60bca2bb198a8263e0edbdbeae97710

    • SHA512

      187e0569199673b63f3de39c3b982534aa829dcaefdef40c1f818067a88915796bedd4e314e9f381afb4c8189035cd8f8dc0eae5bb3860a4c5bd3743c687268e

    Score
    10/10
    • Detect Nerbian RAT malware

    • Nerbian

      Remote access trojan written in the Golang.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks