General

  • Target

    8a03d7389e40a4bd0fc20b4de5812aaee6b8f5a20e164d3949a637ce66f825a9

  • Size

    152KB

  • Sample

    221011-h5fdsacabq

  • MD5

    77fcb9823526386b02d5a0a68c8d1ac0

  • SHA1

    6e9979fe1e233ba56577ade4bde0b196a0479f5d

  • SHA256

    8a03d7389e40a4bd0fc20b4de5812aaee6b8f5a20e164d3949a637ce66f825a9

  • SHA512

    b169eea295d64837172fa02e5aa00e17e4906bcdc468b4adafb58481c26b04415c833242629bda72d250bd8ab442bdc36215255854e72d99563330020c779bfa

  • SSDEEP

    3072:3RjF2wJhQDNo11NKdNuRf7U+3Kyb4U02awKgQCLFPIkc:hJ3P0+9icRfQ+6i02aytwkc

Score
8/10

Malware Config

Targets

    • Target

      8a03d7389e40a4bd0fc20b4de5812aaee6b8f5a20e164d3949a637ce66f825a9

    • Size

      152KB

    • MD5

      77fcb9823526386b02d5a0a68c8d1ac0

    • SHA1

      6e9979fe1e233ba56577ade4bde0b196a0479f5d

    • SHA256

      8a03d7389e40a4bd0fc20b4de5812aaee6b8f5a20e164d3949a637ce66f825a9

    • SHA512

      b169eea295d64837172fa02e5aa00e17e4906bcdc468b4adafb58481c26b04415c833242629bda72d250bd8ab442bdc36215255854e72d99563330020c779bfa

    • SSDEEP

      3072:3RjF2wJhQDNo11NKdNuRf7U+3Kyb4U02awKgQCLFPIkc:hJ3P0+9icRfQ+6i02aytwkc

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks