General

  • Target

    51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2

  • Size

    1.0MB

  • Sample

    221020-f4rdjsfgf4

  • MD5

    579b9d6ff93101819831489592c46142

  • SHA1

    8d816ddf346f8c21d0b0dc7715a1efffaf912b12

  • SHA256

    51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2

  • SHA512

    541b936bed231616ac20d83e41b668268f13fd52b6308decb7997adedb89383865acca2f6ea0bcabc3d48d76fd27a39e94781446c73d5511df8ea8949ee84f4d

  • SSDEEP

    24576:/m5jpYmtRqNovh1rM/8DXvQUlNdOgQPt5bMbF2mgmbbuF:kg+vrrMKocnQt5b/4U

Score
8/10

Malware Config

Targets

    • Target

      51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2

    • Size

      1.0MB

    • MD5

      579b9d6ff93101819831489592c46142

    • SHA1

      8d816ddf346f8c21d0b0dc7715a1efffaf912b12

    • SHA256

      51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2

    • SHA512

      541b936bed231616ac20d83e41b668268f13fd52b6308decb7997adedb89383865acca2f6ea0bcabc3d48d76fd27a39e94781446c73d5511df8ea8949ee84f4d

    • SSDEEP

      24576:/m5jpYmtRqNovh1rM/8DXvQUlNdOgQPt5bMbF2mgmbbuF:kg+vrrMKocnQt5b/4U

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks