General

  • Target

    1dffa49ba805b87bab16fa8ad0f618f399fcfaa2cdd26cf181f291b20e94954b

  • Size

    34KB

  • Sample

    221012-r1e2wsfgdr

  • MD5

    659cd7962ad88c90f4589cd25500c681

  • SHA1

    7665b767c1fd2e6b76778cf34f3b97df4291cc14

  • SHA256

    1dffa49ba805b87bab16fa8ad0f618f399fcfaa2cdd26cf181f291b20e94954b

  • SHA512

    2c80f543f09dadf99b0bc0755348c964fd2dd1e42a1795bd70d52af17b1df706a100d43b3cedc6a38d62563c92011cfaf1a37f608113410bba931dcbc4f34f2c

  • SSDEEP

    768:GwkBWuF+Wk5uMXYxiGmsox40ebUKAUdI2gQa5WND1QHq:GBBWuFfw7YxitsoL/+mVYuK

Score
8/10

Malware Config

Targets

    • Target

      1dffa49ba805b87bab16fa8ad0f618f399fcfaa2cdd26cf181f291b20e94954b

    • Size

      34KB

    • MD5

      659cd7962ad88c90f4589cd25500c681

    • SHA1

      7665b767c1fd2e6b76778cf34f3b97df4291cc14

    • SHA256

      1dffa49ba805b87bab16fa8ad0f618f399fcfaa2cdd26cf181f291b20e94954b

    • SHA512

      2c80f543f09dadf99b0bc0755348c964fd2dd1e42a1795bd70d52af17b1df706a100d43b3cedc6a38d62563c92011cfaf1a37f608113410bba931dcbc4f34f2c

    • SSDEEP

      768:GwkBWuF+Wk5uMXYxiGmsox40ebUKAUdI2gQa5WND1QHq:GBBWuFfw7YxitsoL/+mVYuK

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks