General

  • Target

    c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58

  • Size

    317KB

  • Sample

    221123-xpc12sff36

  • MD5

    43005d910989d6d164915a1137baf860

  • SHA1

    6b1f3c4a8b95c632cb00c56845ec69cf0aa00b7c

  • SHA256

    c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58

  • SHA512

    08e1d54d9a5b719145bcd07db52691f0fd2316d88f123c1539aa699ea127a517805f278d43e9efd1ead3b9e6e2d692edccf792ff71223c0588ff82a15659499a

  • SSDEEP

    6144:rP80iFlOwIjKou2QpK44i8eE68Z2cXvp/IHeiorgVZ:rktQwIuouDK4llE6lcXhA+i3

Malware Config

Targets

    • Target

      c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58

    • Size

      317KB

    • MD5

      43005d910989d6d164915a1137baf860

    • SHA1

      6b1f3c4a8b95c632cb00c56845ec69cf0aa00b7c

    • SHA256

      c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58

    • SHA512

      08e1d54d9a5b719145bcd07db52691f0fd2316d88f123c1539aa699ea127a517805f278d43e9efd1ead3b9e6e2d692edccf792ff71223c0588ff82a15659499a

    • SSDEEP

      6144:rP80iFlOwIjKou2QpK44i8eE68Z2cXvp/IHeiorgVZ:rktQwIuouDK4llE6lcXhA+i3

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks