General

  • Target

    56945b10fb83eb897a742e172bf6996566064aa1af4478f37ca6d29b11704a4f

  • Size

    84KB

  • Sample

    220725-czg3jabccj

  • MD5

    0e1652599e9aedd4acd4790d9da43614

  • SHA1

    80b6834a0a107cf84be715e819227736e1dd56ba

  • SHA256

    56945b10fb83eb897a742e172bf6996566064aa1af4478f37ca6d29b11704a4f

  • SHA512

    07edeaa53df9b5e743e1988d72ba878de09b58baddc30ea90b05179596e31e7fc6cc401a2cd4dc61b04b1b114845a5e7bb2b4dc925d5b9e51c4210c287f61986

Score
10/10

Malware Config

Targets

    • Target

      56945b10fb83eb897a742e172bf6996566064aa1af4478f37ca6d29b11704a4f

    • Size

      84KB

    • MD5

      0e1652599e9aedd4acd4790d9da43614

    • SHA1

      80b6834a0a107cf84be715e819227736e1dd56ba

    • SHA256

      56945b10fb83eb897a742e172bf6996566064aa1af4478f37ca6d29b11704a4f

    • SHA512

      07edeaa53df9b5e743e1988d72ba878de09b58baddc30ea90b05179596e31e7fc6cc401a2cd4dc61b04b1b114845a5e7bb2b4dc925d5b9e51c4210c287f61986

    Score
    10/10
    • suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

      suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks