General

  • Target

    e6fe65bf78dac0ae91f706e5b382d5bcb9699b0d754dddc8c00f4716ca209e5a

  • Size

    76KB

  • Sample

    221001-jjxavagfhp

  • MD5

    1725996a931f0f5164cb69e713608f1f

  • SHA1

    40c2ba674fcbeefaae4bf0e684347ba75ce4e66b

  • SHA256

    e6fe65bf78dac0ae91f706e5b382d5bcb9699b0d754dddc8c00f4716ca209e5a

  • SHA512

    b478b3db392bd072e5dd23a705c71ee75dfc7909139410de4e32c96a28becbf84c8788bdfc6f3a5f00aaa30227c7d1611f4b40a73d9564bad2b8c80402a8185a

  • SSDEEP

    768:P3rtHL1uKHMbw0KyJKNhkKqEAq/YDC+ggWo+rWEGmlH6W/mqsBdnmz5BZEyY7t8z:fr1RupbQauqK/jhrP/mgnat8z

Score
10/10

Malware Config

Targets

    • Target

      e6fe65bf78dac0ae91f706e5b382d5bcb9699b0d754dddc8c00f4716ca209e5a

    • Size

      76KB

    • MD5

      1725996a931f0f5164cb69e713608f1f

    • SHA1

      40c2ba674fcbeefaae4bf0e684347ba75ce4e66b

    • SHA256

      e6fe65bf78dac0ae91f706e5b382d5bcb9699b0d754dddc8c00f4716ca209e5a

    • SHA512

      b478b3db392bd072e5dd23a705c71ee75dfc7909139410de4e32c96a28becbf84c8788bdfc6f3a5f00aaa30227c7d1611f4b40a73d9564bad2b8c80402a8185a

    • SSDEEP

      768:P3rtHL1uKHMbw0KyJKNhkKqEAq/YDC+ggWo+rWEGmlH6W/mqsBdnmz5BZEyY7t8z:fr1RupbQauqK/jhrP/mgnat8z

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks