General

  • Target

    0233504a837034ce9c9e1003d668dd8dbca98c7e01d0ddafae4efbb156962795

  • Size

    197KB

  • Sample

    221020-lbsnssfcdj

  • MD5

    72a5b435edc7dc52998f2cbd3850bd70

  • SHA1

    dbdcabfa75ed9b13a0f738411163bd6d47752f68

  • SHA256

    0233504a837034ce9c9e1003d668dd8dbca98c7e01d0ddafae4efbb156962795

  • SHA512

    f9a9eeffc29b1c1283cf758303c3339b14fc85e04cc38b09d6dac621812bc498d7154ff70c9d4d024f9f00e546daf8eab4b5370283660ed199bb63e740ebf244

  • SSDEEP

    6144:etSVD22UDuhyPzzAsfASooXLwIaPki0/Qh:etSVDR54zzAsYRBPPj

Score
8/10

Malware Config

Targets

    • Target

      0233504a837034ce9c9e1003d668dd8dbca98c7e01d0ddafae4efbb156962795

    • Size

      197KB

    • MD5

      72a5b435edc7dc52998f2cbd3850bd70

    • SHA1

      dbdcabfa75ed9b13a0f738411163bd6d47752f68

    • SHA256

      0233504a837034ce9c9e1003d668dd8dbca98c7e01d0ddafae4efbb156962795

    • SHA512

      f9a9eeffc29b1c1283cf758303c3339b14fc85e04cc38b09d6dac621812bc498d7154ff70c9d4d024f9f00e546daf8eab4b5370283660ed199bb63e740ebf244

    • SSDEEP

      6144:etSVD22UDuhyPzzAsfASooXLwIaPki0/Qh:etSVDR54zzAsYRBPPj

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks