General

  • Target

    f9704b16c55b131c8b80be4cdc46a5b9ee4ec3b07c9060da846c6f46f5669459

  • Size

    721KB

  • Sample

    220724-sf8n5sgbh4

  • MD5

    0e8199b87cea34af9d5a919c3152c989

  • SHA1

    2b2db989545c2c2559d425d43fc5e4f0f606df17

  • SHA256

    f9704b16c55b131c8b80be4cdc46a5b9ee4ec3b07c9060da846c6f46f5669459

  • SHA512

    886559bf14f8d752775b504550944099b0b03a8be8f250cac37730463754c2268c4e53e26e2270b6aa0edee476028d9ef0728e77a8004ea9e11e40b81fa767c6

Malware Config

Targets

    • Target

      f9704b16c55b131c8b80be4cdc46a5b9ee4ec3b07c9060da846c6f46f5669459

    • Size

      721KB

    • MD5

      0e8199b87cea34af9d5a919c3152c989

    • SHA1

      2b2db989545c2c2559d425d43fc5e4f0f606df17

    • SHA256

      f9704b16c55b131c8b80be4cdc46a5b9ee4ec3b07c9060da846c6f46f5669459

    • SHA512

      886559bf14f8d752775b504550944099b0b03a8be8f250cac37730463754c2268c4e53e26e2270b6aa0edee476028d9ef0728e77a8004ea9e11e40b81fa767c6

    Score
    10/10
    • TA505

      Cybercrime group active since 2015, responsible for families like Dridex and Locky.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks