General

  • Target

    5c3ad0ed491dd2b003d9037187a8e06845b85ab418f0426b866eb6779b90af44

  • Size

    186KB

  • Sample

    220801-snee9sbgcp

  • MD5

    c575e868cfda9c54c652520116399024

  • SHA1

    6cd5e110d88d549581710da849345fac4d1bdbc7

  • SHA256

    5c3ad0ed491dd2b003d9037187a8e06845b85ab418f0426b866eb6779b90af44

  • SHA512

    ec3fe0067e3adf7b38441347a67c8679157cf5f43bfbc882a3c83643131c35353db9031f35ec680da076ab8186189cdbf00fa3c6f52b61bcac8c872a200a3a73

Score
8/10

Malware Config

Targets

    • Target

      5c3ad0ed491dd2b003d9037187a8e06845b85ab418f0426b866eb6779b90af44

    • Size

      186KB

    • MD5

      c575e868cfda9c54c652520116399024

    • SHA1

      6cd5e110d88d549581710da849345fac4d1bdbc7

    • SHA256

      5c3ad0ed491dd2b003d9037187a8e06845b85ab418f0426b866eb6779b90af44

    • SHA512

      ec3fe0067e3adf7b38441347a67c8679157cf5f43bfbc882a3c83643131c35353db9031f35ec680da076ab8186189cdbf00fa3c6f52b61bcac8c872a200a3a73

    Score
    8/10
    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks