General

  • Target

    564efdeb29e76b20cb6f4432edbee240ae74ceb3617cce1c65bc1ba0003fce52

  • Size

    94KB

  • Sample

    220725-etndgaedep

  • MD5

    57d1c762330334d1a8a792ccf25ef573

  • SHA1

    ad79f7455cbfb6be0a728aa7d59532a71ff4579c

  • SHA256

    564efdeb29e76b20cb6f4432edbee240ae74ceb3617cce1c65bc1ba0003fce52

  • SHA512

    180e43efeb64a28c30c43f738ddef65e72db84ddfeb96137031c8566f93da7e9eb2126b4e7f604167fd67c0a7880cbb8a344c69bd45dd3b279a330f4e97244e0

Score
10/10

Malware Config

Targets

    • Target

      564efdeb29e76b20cb6f4432edbee240ae74ceb3617cce1c65bc1ba0003fce52

    • Size

      94KB

    • MD5

      57d1c762330334d1a8a792ccf25ef573

    • SHA1

      ad79f7455cbfb6be0a728aa7d59532a71ff4579c

    • SHA256

      564efdeb29e76b20cb6f4432edbee240ae74ceb3617cce1c65bc1ba0003fce52

    • SHA512

      180e43efeb64a28c30c43f738ddef65e72db84ddfeb96137031c8566f93da7e9eb2126b4e7f604167fd67c0a7880cbb8a344c69bd45dd3b279a330f4e97244e0

    Score
    10/10
    • suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

      suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks