General

  • Target

    93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e

  • Size

    174KB

  • Sample

    221106-jy8bnadeej

  • MD5

    31198e14dd25c3fbd14b143ea5c42bfc

  • SHA1

    de1314ece298e35db29fbd51bcaa98c3702e865d

  • SHA256

    93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e

  • SHA512

    347709682bf365f21bf23bc80d2c0c734f580ae6632630209f0fc492bc6ffc25e06ec13fce2fabd57f77aa8fef176988d18f2e9d0562dbe9a2fa5b18a2c076fc

  • SSDEEP

    3072:By2ZFOxK/8uV0Vgygkfrckq1fWpUp9Kpq43nSZ:3ExyHV0z1frcTepZqE

Score
8/10

Malware Config

Targets

    • Target

      93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e

    • Size

      174KB

    • MD5

      31198e14dd25c3fbd14b143ea5c42bfc

    • SHA1

      de1314ece298e35db29fbd51bcaa98c3702e865d

    • SHA256

      93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e

    • SHA512

      347709682bf365f21bf23bc80d2c0c734f580ae6632630209f0fc492bc6ffc25e06ec13fce2fabd57f77aa8fef176988d18f2e9d0562dbe9a2fa5b18a2c076fc

    • SSDEEP

      3072:By2ZFOxK/8uV0Vgygkfrckq1fWpUp9Kpq43nSZ:3ExyHV0z1frcTepZqE

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks