General

  • Target

    58085b65d93e4f4c4440aa96c8413418abb65d74efbcec21263d5a67c858277e

  • Size

    200KB

  • Sample

    221019-2seq9sbhdj

  • MD5

    91246a1b1f8c7da946c36b990e554fa0

  • SHA1

    9e0528cd58e4b54f308149b33c95b81897aa544b

  • SHA256

    58085b65d93e4f4c4440aa96c8413418abb65d74efbcec21263d5a67c858277e

  • SHA512

    372e9e7cea6fae718c9c21a1f70ad1d2fc6e29a43a253ee27fd67dc10fc59c6c20b35a3a3d6a1753b7785ff63f7e2c3b27e5ccb012800a044fb8d5aa860fadb5

  • SSDEEP

    3072:zJs0RsxBGqdAE8Om4IdIWaCRlH7BUCX2T5mECykCmMXvJj5NVENujzlHouOS2ElK:PUcqdBVm4zcFmplEN+zlInElXa

Score
8/10

Malware Config

Targets

    • Target

      58085b65d93e4f4c4440aa96c8413418abb65d74efbcec21263d5a67c858277e

    • Size

      200KB

    • MD5

      91246a1b1f8c7da946c36b990e554fa0

    • SHA1

      9e0528cd58e4b54f308149b33c95b81897aa544b

    • SHA256

      58085b65d93e4f4c4440aa96c8413418abb65d74efbcec21263d5a67c858277e

    • SHA512

      372e9e7cea6fae718c9c21a1f70ad1d2fc6e29a43a253ee27fd67dc10fc59c6c20b35a3a3d6a1753b7785ff63f7e2c3b27e5ccb012800a044fb8d5aa860fadb5

    • SSDEEP

      3072:zJs0RsxBGqdAE8Om4IdIWaCRlH7BUCX2T5mECykCmMXvJj5NVENujzlHouOS2ElK:PUcqdBVm4zcFmplEN+zlInElXa

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks