General

  • Target

    3d68985e9c33958b324d57f35169b871a1c58491697057d6ed4c474a57a41c51

  • Size

    283KB

  • Sample

    220701-hx35waagf7

  • MD5

    d1500ecd912ea4816ce4ed184fb85b4d

  • SHA1

    315b127de2bde334324a30d608545b05bf35c7fb

  • SHA256

    3d68985e9c33958b324d57f35169b871a1c58491697057d6ed4c474a57a41c51

  • SHA512

    1e89e106ea8754d1c3f806823110526ad56341c0a383a4877e38f2af2ed0fab84f6c3d4a6947e0e38baff852cb7b5c82733b34f0da3d79a50f8e6a10f87efd77

Malware Config

Targets

    • Target

      3d68985e9c33958b324d57f35169b871a1c58491697057d6ed4c474a57a41c51

    • Size

      283KB

    • MD5

      d1500ecd912ea4816ce4ed184fb85b4d

    • SHA1

      315b127de2bde334324a30d608545b05bf35c7fb

    • SHA256

      3d68985e9c33958b324d57f35169b871a1c58491697057d6ed4c474a57a41c51

    • SHA512

      1e89e106ea8754d1c3f806823110526ad56341c0a383a4877e38f2af2ed0fab84f6c3d4a6947e0e38baff852cb7b5c82733b34f0da3d79a50f8e6a10f87efd77

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks