General

  • Target

    a61d3fa4a1a129bd9115af5eda2734fcf6f3bc75c2e462146fbb69decfce9661

  • Size

    933KB

  • Sample

    220625-lz2avahha7

  • MD5

    1bcc7aafd38284ff06ecf48e1ed82e76

  • SHA1

    55d30730996fb306ca1a3420d74fd63104093660

  • SHA256

    a61d3fa4a1a129bd9115af5eda2734fcf6f3bc75c2e462146fbb69decfce9661

  • SHA512

    b87207b2ed8ff91e6d692a40d63e48ea63f16ef77dd982135d63ff12022b071213f7dc0acfe11df3ea8adad65131bb35d00f06aa50afcf05ce31e1ebd97b73e3

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a61d3fa4a1a129bd9115af5eda2734fcf6f3bc75c2e462146fbb69decfce9661

    • Size

      933KB

    • MD5

      1bcc7aafd38284ff06ecf48e1ed82e76

    • SHA1

      55d30730996fb306ca1a3420d74fd63104093660

    • SHA256

      a61d3fa4a1a129bd9115af5eda2734fcf6f3bc75c2e462146fbb69decfce9661

    • SHA512

      b87207b2ed8ff91e6d692a40d63e48ea63f16ef77dd982135d63ff12022b071213f7dc0acfe11df3ea8adad65131bb35d00f06aa50afcf05ce31e1ebd97b73e3

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks