General

  • Target

    d3a321451933f27714761c68ebc442685c7d0f66bedc16799bb3da2ed7dd0230

  • Size

    38KB

  • Sample

    221106-rpmycshcen

  • MD5

    06aaeddc83ed3c9975b7071c122cba50

  • SHA1

    dab072f30c2afb8b9691cd1ed011665ff955777c

  • SHA256

    d3a321451933f27714761c68ebc442685c7d0f66bedc16799bb3da2ed7dd0230

  • SHA512

    c1d3028411624eae117273af4797e31c6d2b4854fabda462d1cc447e52297a5d1c71fb7698ede031cef5024d0792ecb8079631aabd67f4f33656e166372fa9d2

  • SSDEEP

    768:EoGBwgQ9xh7miRJsKue84EZ43eX/rUI/w9bbVAAtFPoIlan8K:EoGBwgc7miL85ZGWQIohZAAfm8K

Score
8/10

Malware Config

Targets

    • Target

      d3a321451933f27714761c68ebc442685c7d0f66bedc16799bb3da2ed7dd0230

    • Size

      38KB

    • MD5

      06aaeddc83ed3c9975b7071c122cba50

    • SHA1

      dab072f30c2afb8b9691cd1ed011665ff955777c

    • SHA256

      d3a321451933f27714761c68ebc442685c7d0f66bedc16799bb3da2ed7dd0230

    • SHA512

      c1d3028411624eae117273af4797e31c6d2b4854fabda462d1cc447e52297a5d1c71fb7698ede031cef5024d0792ecb8079631aabd67f4f33656e166372fa9d2

    • SSDEEP

      768:EoGBwgQ9xh7miRJsKue84EZ43eX/rUI/w9bbVAAtFPoIlan8K:EoGBwgc7miL85ZGWQIohZAAfm8K

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks