General

  • Target

    06c6482cc43b8d4f735e1f8ffaefff412d16773951e183eedfd05f9797d5750a

  • Size

    34KB

  • Sample

    220919-jwddhafcc9

  • MD5

    5b0b3a8addde48827a3e56c140d0df87

  • SHA1

    0c3458d499f4a6306e1f6075b3635eb689bc9aad

  • SHA256

    06c6482cc43b8d4f735e1f8ffaefff412d16773951e183eedfd05f9797d5750a

  • SHA512

    e1e69887ce33a41c32e4f0830cd04f485bab02a915dc9d1113d375ad950ddfafad7461d85c52e3e2d5f53a6a04634280d46afd592c6b82eb4a1df70d7a01dc04

  • SSDEEP

    768:ksYcI18QEdR6/1uixIROstI3auUjf9rxsW93yc1Ln7En1:ksZ+0GS8sgkjfI2E1

Score
8/10

Malware Config

Targets

    • Target

      06c6482cc43b8d4f735e1f8ffaefff412d16773951e183eedfd05f9797d5750a

    • Size

      34KB

    • MD5

      5b0b3a8addde48827a3e56c140d0df87

    • SHA1

      0c3458d499f4a6306e1f6075b3635eb689bc9aad

    • SHA256

      06c6482cc43b8d4f735e1f8ffaefff412d16773951e183eedfd05f9797d5750a

    • SHA512

      e1e69887ce33a41c32e4f0830cd04f485bab02a915dc9d1113d375ad950ddfafad7461d85c52e3e2d5f53a6a04634280d46afd592c6b82eb4a1df70d7a01dc04

    • SSDEEP

      768:ksYcI18QEdR6/1uixIROstI3auUjf9rxsW93yc1Ln7En1:ksZ+0GS8sgkjfI2E1

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks