General

  • Target

    yakuza.x86

  • Size

    27KB

  • Sample

    220808-1kwt5saeh4

  • MD5

    b09bb1c88a0d81eb738aacd870c5d896

  • SHA1

    76e70708a079025dc15a004b4e6ccf0638caead8

  • SHA256

    f8486061d23531296df5c98f88582265cd9525d75c086c60a6aa1d17745c8daf

  • SHA512

    2922757f5fc16333fc5e29a9bc0a3a04926652a686befc90e9b9755e695982d62434d4aeb5aeef8ec578336807b1f88a2934c9b232dc8a7a69921c0c85ffc4ed

Score
9/10

Malware Config

Targets

    • Target

      yakuza.x86

    • Size

      27KB

    • MD5

      b09bb1c88a0d81eb738aacd870c5d896

    • SHA1

      76e70708a079025dc15a004b4e6ccf0638caead8

    • SHA256

      f8486061d23531296df5c98f88582265cd9525d75c086c60a6aa1d17745c8daf

    • SHA512

      2922757f5fc16333fc5e29a9bc0a3a04926652a686befc90e9b9755e695982d62434d4aeb5aeef8ec578336807b1f88a2934c9b232dc8a7a69921c0c85ffc4ed

    Score
    9/10
    • Contacts a large (365125) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation