General

  • Target

    300a241a7d3af346c7748c6de993b4de07add7655de30e4fd3c97a8796079110

  • Size

    288KB

  • Sample

    221027-fng5yaager

  • MD5

    6196ebf91db880d5bb336bf40207cdf4

  • SHA1

    c9eb22b403278325d932a8840b71ac6134809aca

  • SHA256

    300a241a7d3af346c7748c6de993b4de07add7655de30e4fd3c97a8796079110

  • SHA512

    166bc52377ee3d3134aa07b40dbc40eba2e26984ee50e374c6b734c50d739138fdf7f9f1e6eb372e4e5ecd3f44cea391f3165a8b4751bc407a939dba2c231930

  • SSDEEP

    3072:O5QdcZ7EfaNFDnnUVDOtNHN9IroJPob//FrdFBZg4WUw+0JBeJuwqMlX:4QdeEfaNFziDiHmuPErrg4WUD0J40w

Score
8/10

Malware Config

Targets

    • Target

      300a241a7d3af346c7748c6de993b4de07add7655de30e4fd3c97a8796079110

    • Size

      288KB

    • MD5

      6196ebf91db880d5bb336bf40207cdf4

    • SHA1

      c9eb22b403278325d932a8840b71ac6134809aca

    • SHA256

      300a241a7d3af346c7748c6de993b4de07add7655de30e4fd3c97a8796079110

    • SHA512

      166bc52377ee3d3134aa07b40dbc40eba2e26984ee50e374c6b734c50d739138fdf7f9f1e6eb372e4e5ecd3f44cea391f3165a8b4751bc407a939dba2c231930

    • SSDEEP

      3072:O5QdcZ7EfaNFDnnUVDOtNHN9IroJPob//FrdFBZg4WUw+0JBeJuwqMlX:4QdeEfaNFziDiHmuPErrg4WUD0J40w

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks