General

  • Target

    560eacd7926a749b0552ffe724c7d1087fe4a5a01175bf61938261e5859fdced

  • Size

    73KB

  • Sample

    220725-gqmzmshggm

  • MD5

    4444984dabe4299f41d94221b5bf5598

  • SHA1

    5e2dcc91e037a140d5f95db68d6ea2aa6b316b3f

  • SHA256

    560eacd7926a749b0552ffe724c7d1087fe4a5a01175bf61938261e5859fdced

  • SHA512

    0fa90ac96c48ac7f441cc8491d60449445feb609e1f65ee17bab85d10e41dc068dada3ceaec5cfd52d7bfa338612654c6e2e1c1be2daf4d260db5881728c69a9

Score
10/10

Malware Config

Targets

    • Target

      560eacd7926a749b0552ffe724c7d1087fe4a5a01175bf61938261e5859fdced

    • Size

      73KB

    • MD5

      4444984dabe4299f41d94221b5bf5598

    • SHA1

      5e2dcc91e037a140d5f95db68d6ea2aa6b316b3f

    • SHA256

      560eacd7926a749b0552ffe724c7d1087fe4a5a01175bf61938261e5859fdced

    • SHA512

      0fa90ac96c48ac7f441cc8491d60449445feb609e1f65ee17bab85d10e41dc068dada3ceaec5cfd52d7bfa338612654c6e2e1c1be2daf4d260db5881728c69a9

    Score
    10/10
    • suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

      suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks