General

  • Target

    f01421669392de1377413ce84598298a3ca80717f0b63384846b31aae74620d0

  • Size

    35KB

  • Sample

    220919-jtn28afbc9

  • MD5

    185004b9060b45242351be806e85cf95

  • SHA1

    b3b1724a406ede32d3621f769bf325fca53e1e5a

  • SHA256

    f01421669392de1377413ce84598298a3ca80717f0b63384846b31aae74620d0

  • SHA512

    b00ada572bff751a337bbef6895848e1d0d5973de1f07dadb5e3896a00157072bec7482494ec493fc78b538bbecc9ee8535beee203aaa7f460bcff425f34da72

  • SSDEEP

    384:uTgmkYQJ89BqD+H1Apn2tz7XFLsti35MXWTIqB0A+xWbosx97MSAl3AFj8YczMsn:uGJnTt2BVsfIt2ofPEuuMMZSoAsdXBB9

Score
8/10

Malware Config

Targets

    • Target

      f01421669392de1377413ce84598298a3ca80717f0b63384846b31aae74620d0

    • Size

      35KB

    • MD5

      185004b9060b45242351be806e85cf95

    • SHA1

      b3b1724a406ede32d3621f769bf325fca53e1e5a

    • SHA256

      f01421669392de1377413ce84598298a3ca80717f0b63384846b31aae74620d0

    • SHA512

      b00ada572bff751a337bbef6895848e1d0d5973de1f07dadb5e3896a00157072bec7482494ec493fc78b538bbecc9ee8535beee203aaa7f460bcff425f34da72

    • SSDEEP

      384:uTgmkYQJ89BqD+H1Apn2tz7XFLsti35MXWTIqB0A+xWbosx97MSAl3AFj8YczMsn:uGJnTt2BVsfIt2ofPEuuMMZSoAsdXBB9

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks