General

  • Target

    199be30f833a80daa588ad104ea4f6ead50bc53c10f79c15a03a9648da961dd7

  • Size

    201KB

  • Sample

    221121-t7z2radb7y

  • MD5

    12104439569c3664b380e356265eafb7

  • SHA1

    67ecd0819277cca961c2e5d20067e1532beaba2b

  • SHA256

    199be30f833a80daa588ad104ea4f6ead50bc53c10f79c15a03a9648da961dd7

  • SHA512

    ad2206b7e17591320bbf005e6a1f2999c8cc1e374f4549c1c6e830d6dc680231d5627bbe14cf239ceeade1c5a4f334cdd8a6bd08686c27e14eb1148777cb1714

  • SSDEEP

    6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFN:HqEjk7l7FN

Malware Config

Targets

    • Target

      199be30f833a80daa588ad104ea4f6ead50bc53c10f79c15a03a9648da961dd7

    • Size

      201KB

    • MD5

      12104439569c3664b380e356265eafb7

    • SHA1

      67ecd0819277cca961c2e5d20067e1532beaba2b

    • SHA256

      199be30f833a80daa588ad104ea4f6ead50bc53c10f79c15a03a9648da961dd7

    • SHA512

      ad2206b7e17591320bbf005e6a1f2999c8cc1e374f4549c1c6e830d6dc680231d5627bbe14cf239ceeade1c5a4f334cdd8a6bd08686c27e14eb1148777cb1714

    • SSDEEP

      6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFN:HqEjk7l7FN

    • ParallaxRat

      ParallaxRat is a multipurpose RAT written in MASM.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks