General

  • Target

    9a80f48300b28fe0811707d6922907adc875ed73933922da9f0cb3610685fe64

  • Size

    80KB

  • Sample

    221030-jaaeqahce9

  • MD5

    a2e4ead023e72cb5e5fc67f9b29f0968

  • SHA1

    2e9bff96039311afe96a23975d3c8f29edcc21ba

  • SHA256

    9a80f48300b28fe0811707d6922907adc875ed73933922da9f0cb3610685fe64

  • SHA512

    911ff0cc3b33e2d4acdce160092fe7d2edde5947437e9e6b10f77fa0a309e26b8abeeef63a13272bf04cba76140430878aad2eba3c84e82ffe5f17c497249d1c

  • SSDEEP

    1536:l7/c3G2761plaoYOHGFCpFhvMj6eNwHWBlZL4FO:ljg4laoYZF8FRM5Nh4A

Score
8/10

Malware Config

Targets

    • Target

      9a80f48300b28fe0811707d6922907adc875ed73933922da9f0cb3610685fe64

    • Size

      80KB

    • MD5

      a2e4ead023e72cb5e5fc67f9b29f0968

    • SHA1

      2e9bff96039311afe96a23975d3c8f29edcc21ba

    • SHA256

      9a80f48300b28fe0811707d6922907adc875ed73933922da9f0cb3610685fe64

    • SHA512

      911ff0cc3b33e2d4acdce160092fe7d2edde5947437e9e6b10f77fa0a309e26b8abeeef63a13272bf04cba76140430878aad2eba3c84e82ffe5f17c497249d1c

    • SSDEEP

      1536:l7/c3G2761plaoYOHGFCpFhvMj6eNwHWBlZL4FO:ljg4laoYZF8FRM5Nh4A

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks