General

  • Target

    56196fce8402d74704698d28c89c17140baabd93a01705e90bc840cb16900774

  • Size

    89KB

  • Sample

    220725-ghw8cahdgl

  • MD5

    7bb4a4b3a4a6e17ece2e0a02f52987b0

  • SHA1

    895f5d4a12acd6e649e605d8f13d364f35bd0c2b

  • SHA256

    56196fce8402d74704698d28c89c17140baabd93a01705e90bc840cb16900774

  • SHA512

    fe66a2f4c573bffd62ad3d94edde3843dda246e51a7aaa090f4cfe43960ca89f079f36773b593eba987404c423475eecc6c28ddf70dfc727dec7ab6f42785d44

Score
10/10

Malware Config

Targets

    • Target

      56196fce8402d74704698d28c89c17140baabd93a01705e90bc840cb16900774

    • Size

      89KB

    • MD5

      7bb4a4b3a4a6e17ece2e0a02f52987b0

    • SHA1

      895f5d4a12acd6e649e605d8f13d364f35bd0c2b

    • SHA256

      56196fce8402d74704698d28c89c17140baabd93a01705e90bc840cb16900774

    • SHA512

      fe66a2f4c573bffd62ad3d94edde3843dda246e51a7aaa090f4cfe43960ca89f079f36773b593eba987404c423475eecc6c28ddf70dfc727dec7ab6f42785d44

    Score
    10/10
    • suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

      suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks