General

  • Target

    43c5f2e7aacbc9a3439a810e3768087b7c8bea191ef84d71b2aa8686befed073

  • Size

    590KB

  • Sample

    220707-1pv4eadchl

  • MD5

    eb5eb336636e3f6cacf6c8db6bf4ea00

  • SHA1

    e09eea305aa0f2897b3d7dac55c2ef2857bdfa5b

  • SHA256

    43c5f2e7aacbc9a3439a810e3768087b7c8bea191ef84d71b2aa8686befed073

  • SHA512

    4f728b1ae4b5328feb491e163950c78e888270fd4cd0a19396ff770e5ec2bd38815ce2fa6539bda69e4601150e6c9807708255e8219ded2a18420d8340bbffd5

Malware Config

Targets

    • Target

      Vcffipzmnipbxzdl.exe

    • Size

      827KB

    • MD5

      7f9c454a2e016e533e181d53eba113bc

    • SHA1

      694dc7713537a7237030f7623881423fcb8d8c5c

    • SHA256

      c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378

    • SHA512

      6869cf5a7c3526acf402b1ef09a9477dedf6cf534ff728e0823b9413ba41e888bd5b61cc20421d4a799df493126598a4a906ac2ab46147d9e4bcfa5d3600a110

    • CryptoLocker

      Ransomware family with multiple variants.

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks