General

  • Target

    aae401230eba00929f36e9acf101afee527e8830b05fec0aa13834adbc9ef77e

  • Size

    704KB

  • Sample

    220625-lz1pbaffgm

  • MD5

    787e54350192a8623a1da604e095bd1b

  • SHA1

    2a79af33c4f00721a63ff3d8a34ddc2d5d17d06d

  • SHA256

    aae401230eba00929f36e9acf101afee527e8830b05fec0aa13834adbc9ef77e

  • SHA512

    8082f42e1c76f91706b5158b435ab35103e562b9b3a9c33df481453510000ddc5737fbdf7102da540f2cb3da3e0adea7c1d5881813edd8589709220f421eac0c

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Language
xlm4.0
Source

Targets

    • Target

      aae401230eba00929f36e9acf101afee527e8830b05fec0aa13834adbc9ef77e

    • Size

      704KB

    • MD5

      787e54350192a8623a1da604e095bd1b

    • SHA1

      2a79af33c4f00721a63ff3d8a34ddc2d5d17d06d

    • SHA256

      aae401230eba00929f36e9acf101afee527e8830b05fec0aa13834adbc9ef77e

    • SHA512

      8082f42e1c76f91706b5158b435ab35103e562b9b3a9c33df481453510000ddc5737fbdf7102da540f2cb3da3e0adea7c1d5881813edd8589709220f421eac0c

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks