General

  • Target

    9386c7aae6512cac4fce0da36c94fd565afa83c73c0d8d3722151e6023ce14fc

  • Size

    37KB

  • Sample

    221123-ztfzlsdg44

  • MD5

    35ef25fc8a4ee7724a73d3359f436a08

  • SHA1

    5f66c4d06ecff208798916d599241af35eb26c4b

  • SHA256

    9386c7aae6512cac4fce0da36c94fd565afa83c73c0d8d3722151e6023ce14fc

  • SHA512

    d2e62e6f2b4289415591ae1ba7356235a34ab697acfb7d8d7011551b9be425ddb27e368d610e9c06936fb0edd715a606321979312d6e9a797d046439c6bdce51

  • SSDEEP

    768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrh:j0Rbb5WRQYt9ir/2wrai

Score
8/10

Malware Config

Targets

    • Target

      9386c7aae6512cac4fce0da36c94fd565afa83c73c0d8d3722151e6023ce14fc

    • Size

      37KB

    • MD5

      35ef25fc8a4ee7724a73d3359f436a08

    • SHA1

      5f66c4d06ecff208798916d599241af35eb26c4b

    • SHA256

      9386c7aae6512cac4fce0da36c94fd565afa83c73c0d8d3722151e6023ce14fc

    • SHA512

      d2e62e6f2b4289415591ae1ba7356235a34ab697acfb7d8d7011551b9be425ddb27e368d610e9c06936fb0edd715a606321979312d6e9a797d046439c6bdce51

    • SSDEEP

      768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrh:j0Rbb5WRQYt9ir/2wrai

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks