General

  • Target

    394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207

  • Size

    183KB

  • Sample

    221123-rxjkxacf8z

  • MD5

    cae5375edf4df5c7e703de7466194367

  • SHA1

    a6f60837bf37c64800d7333695cc63b9aad2a967

  • SHA256

    394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207

  • SHA512

    7d083bb26c378a58aca53ae14da5a966b459c0ea7e16fcece3de5f14c68edf95132d7cc754eda550dbf074dbc5209af5616b1e7aeff640be62d09d4c01ff4745

  • SSDEEP

    3072:KBPUQsZZQvSq8QM6L8QZ6UV8Q+UZOi9CDDwTgVEZM1n87fhzGlu4I:wxsZL7QM6L8QZ668cZOi4wi9afw

Score
8/10

Malware Config

Targets

    • Target

      394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207

    • Size

      183KB

    • MD5

      cae5375edf4df5c7e703de7466194367

    • SHA1

      a6f60837bf37c64800d7333695cc63b9aad2a967

    • SHA256

      394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207

    • SHA512

      7d083bb26c378a58aca53ae14da5a966b459c0ea7e16fcece3de5f14c68edf95132d7cc754eda550dbf074dbc5209af5616b1e7aeff640be62d09d4c01ff4745

    • SSDEEP

      3072:KBPUQsZZQvSq8QM6L8QZ6UV8Q+UZOi9CDDwTgVEZM1n87fhzGlu4I:wxsZL7QM6L8QZ668cZOi4wi9afw

    Score
    8/10
    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks