General

  • Target

    dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60

  • Size

    512KB

  • Sample

    221011-v5w3raffh5

  • MD5

    2e45e50d3b1e2b84518b223afa535d00

  • SHA1

    776c7b02bb3dff3cc03c15598ab0d25fe5edf2be

  • SHA256

    dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60

  • SHA512

    a299db84176a46aa4b85e1dc97793a5bcf6fb80fe6a0937e7bd9c979daf758ec98ba83cc0c1eec82fce79bdc9188566f42dac0da5dffd5c7a0eb9fdbfee81b15

  • SSDEEP

    12288:i1Ul4V1CoZ0n1Ul4c1Ul4O1Ul4V1CoZ0t:i2lYLZ0n2ld2lf2lYLZ0t

Score
8/10

Malware Config

Targets

    • Target

      dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60

    • Size

      512KB

    • MD5

      2e45e50d3b1e2b84518b223afa535d00

    • SHA1

      776c7b02bb3dff3cc03c15598ab0d25fe5edf2be

    • SHA256

      dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60

    • SHA512

      a299db84176a46aa4b85e1dc97793a5bcf6fb80fe6a0937e7bd9c979daf758ec98ba83cc0c1eec82fce79bdc9188566f42dac0da5dffd5c7a0eb9fdbfee81b15

    • SSDEEP

      12288:i1Ul4V1CoZ0n1Ul4c1Ul4O1Ul4V1CoZ0t:i2lYLZ0n2ld2lf2lYLZ0t

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks