General

  • Target

    49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408

  • Size

    37KB

  • Sample

    221003-pacsqsege7

  • MD5

    655b6d547342a221ad72dbc2f37a5f67

  • SHA1

    047542028e5babbd74005d356ab1730502f1cb55

  • SHA256

    49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408

  • SHA512

    ee58eead75a80fd1655cf40f6b8ed55ca3fd98f9e08f2bb706c5914a6b1a61ba3673e3c4ac77c2bf06e18297515f2c1819ce20fbfbbabfbe34cd6cb462df9207

  • SSDEEP

    768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrV:j0Rbb5WRQYt9ir/2wram

Score
8/10

Malware Config

Targets

    • Target

      49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408

    • Size

      37KB

    • MD5

      655b6d547342a221ad72dbc2f37a5f67

    • SHA1

      047542028e5babbd74005d356ab1730502f1cb55

    • SHA256

      49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408

    • SHA512

      ee58eead75a80fd1655cf40f6b8ed55ca3fd98f9e08f2bb706c5914a6b1a61ba3673e3c4ac77c2bf06e18297515f2c1819ce20fbfbbabfbe34cd6cb462df9207

    • SSDEEP

      768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrV:j0Rbb5WRQYt9ir/2wram

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks