General

  • Target

    67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc

  • Size

    38KB

  • Sample

    221029-2g2rnahhg3

  • MD5

    5c8859d84a52976788d4166615e1cb68

  • SHA1

    a2cd94db18d56e2813c630c8890a4cc1c1a3a210

  • SHA256

    67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc

  • SHA512

    c13853e1dd101ff8ad7ae00e2d20343655ac5988194bf88e6cfc4ac4f6f15b75319aad8ae603a69be86f093a85197287e6b6a6d539bb92fc03b518ec0c928e6d

  • SSDEEP

    768:cD8Mku/08vChRzSbJ/iB1ljyRFQPeB1Qi6YyJVQQeDlV8T3+cxcGI:ABkuM1hR2g18CeB1QMyJVQQeD4vxcGI

Score
8/10

Malware Config

Targets

    • Target

      67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc

    • Size

      38KB

    • MD5

      5c8859d84a52976788d4166615e1cb68

    • SHA1

      a2cd94db18d56e2813c630c8890a4cc1c1a3a210

    • SHA256

      67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc

    • SHA512

      c13853e1dd101ff8ad7ae00e2d20343655ac5988194bf88e6cfc4ac4f6f15b75319aad8ae603a69be86f093a85197287e6b6a6d539bb92fc03b518ec0c928e6d

    • SSDEEP

      768:cD8Mku/08vChRzSbJ/iB1ljyRFQPeB1Qi6YyJVQQeDlV8T3+cxcGI:ABkuM1hR2g18CeB1QMyJVQQeD4vxcGI

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks