General

  • Target

    32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79

  • Size

    224KB

  • Sample

    221123-rzzd5sch5z

  • MD5

    f8618ef11432e37cc9954515a98b40c7

  • SHA1

    713d6f84ddaa638bb72b844bd375205e75ffe436

  • SHA256

    32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79

  • SHA512

    3b63bdf903eac5b4e3d6610c978c9201198e33f5e7d7141ac1c657ab4d60a304461ffb0a75d8a147e3dc779d696d8807aa5acd792d8446b869c174fb6a3c5c69

  • SSDEEP

    6144:yNBl76cpETWpZxcsvaSzjsQLSp0Dk7QHmvgKQ:6l76cMKYsvaS4R7xVQ

Score
8/10

Malware Config

Targets

    • Target

      32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79

    • Size

      224KB

    • MD5

      f8618ef11432e37cc9954515a98b40c7

    • SHA1

      713d6f84ddaa638bb72b844bd375205e75ffe436

    • SHA256

      32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79

    • SHA512

      3b63bdf903eac5b4e3d6610c978c9201198e33f5e7d7141ac1c657ab4d60a304461ffb0a75d8a147e3dc779d696d8807aa5acd792d8446b869c174fb6a3c5c69

    • SSDEEP

      6144:yNBl76cpETWpZxcsvaSzjsQLSp0Dk7QHmvgKQ:6l76cMKYsvaS4R7xVQ

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks