General

  • Target

    032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201

  • Size

    282KB

  • Sample

    220625-l13kashhe6

  • MD5

    7d753d90d322ad0765eccf1a5d3e1474

  • SHA1

    3853242b62e76f74c3187132411b2af4964aaa87

  • SHA256

    032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201

  • SHA512

    b4c0df830de06c3f7d47212adccf7188fa77f87fda84ea0d786d9e2299922af96fc3f8ebe353a67b6c515e361f4ba026e8a191eb00e0c6508673063d8dbca9b7

Malware Config

Targets

    • Target

      032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201

    • Size

      282KB

    • MD5

      7d753d90d322ad0765eccf1a5d3e1474

    • SHA1

      3853242b62e76f74c3187132411b2af4964aaa87

    • SHA256

      032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201

    • SHA512

      b4c0df830de06c3f7d47212adccf7188fa77f87fda84ea0d786d9e2299922af96fc3f8ebe353a67b6c515e361f4ba026e8a191eb00e0c6508673063d8dbca9b7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks