General

  • Target

    573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711

  • Size

    73KB

  • Sample

    220725-aferysegfn

  • MD5

    5c67bfc12fc8c93bb98225966ad468d1

  • SHA1

    cabcb7a591c7fbf9c5e90d84cefc16d1a94ac0eb

  • SHA256

    573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711

  • SHA512

    20cfb4b43779fc0ff2c1b9bc177f3c58ecbdf33c8225286b680eb65abe3a434123b2c435a23b43ebb4960cd0e1cff4359006041efc4129b69f8a05b6d3364bd5

Score
10/10

Malware Config

Targets

    • Target

      573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711

    • Size

      73KB

    • MD5

      5c67bfc12fc8c93bb98225966ad468d1

    • SHA1

      cabcb7a591c7fbf9c5e90d84cefc16d1a94ac0eb

    • SHA256

      573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711

    • SHA512

      20cfb4b43779fc0ff2c1b9bc177f3c58ecbdf33c8225286b680eb65abe3a434123b2c435a23b43ebb4960cd0e1cff4359006041efc4129b69f8a05b6d3364bd5

    Score
    10/10
    • suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

      suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks