General

  • Target

    566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c

  • Size

    305KB

  • Sample

    220725-dxgjnacghk

  • MD5

    51537b5808ea847e1959f46a6f5ea4f0

  • SHA1

    6ee4d5f8fc6004b280cb61b111dedf2e77d6e515

  • SHA256

    566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c

  • SHA512

    5d7d9d539b5700dddcd31267e1e028bbd094d6536d6bf38311c38a720a338469b76f61783d3ac8d962a871b0651b36534ae10b7c664cb8731b76de21c3ee5b6a

Score
10/10

Malware Config

Targets

    • Target

      566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c

    • Size

      305KB

    • MD5

      51537b5808ea847e1959f46a6f5ea4f0

    • SHA1

      6ee4d5f8fc6004b280cb61b111dedf2e77d6e515

    • SHA256

      566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c

    • SHA512

      5d7d9d539b5700dddcd31267e1e028bbd094d6536d6bf38311c38a720a338469b76f61783d3ac8d962a871b0651b36534ae10b7c664cb8731b76de21c3ee5b6a

    Score
    10/10
    • suricata: ET MALWARE Possible Zeus GameOver Connectivity Check

      suricata: ET MALWARE Possible Zeus GameOver Connectivity Check

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks