General

  • Target

    17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed

  • Size

    39KB

  • Sample

    221123-zth4zagg9y

  • MD5

    4b8a6dc8994b8669b127da15590e4938

  • SHA1

    170fd232e386caa2a0c768118c192c58a446e28e

  • SHA256

    17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed

  • SHA512

    5234922dbcd78d892e5f611973f80cc84aa0a3b9ca446e13897038510ae317714120a9c308db33acb44b1036cc8e9a362398f8d16957f993b56a781b5e32d698

  • SSDEEP

    768:30hvZ7K2gJSRzmKxBqg+9ZPba3QagR9DZGYVW6YXcTLNNl:kHSEHBq95XagR9lGYV/T

Score
8/10

Malware Config

Targets

    • Target

      17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed

    • Size

      39KB

    • MD5

      4b8a6dc8994b8669b127da15590e4938

    • SHA1

      170fd232e386caa2a0c768118c192c58a446e28e

    • SHA256

      17f5bebeb4b7776af71d02c138303d91ffb649b4c7e6796cf53975e35334a7ed

    • SHA512

      5234922dbcd78d892e5f611973f80cc84aa0a3b9ca446e13897038510ae317714120a9c308db33acb44b1036cc8e9a362398f8d16957f993b56a781b5e32d698

    • SSDEEP

      768:30hvZ7K2gJSRzmKxBqg+9ZPba3QagR9DZGYVW6YXcTLNNl:kHSEHBq95XagR9lGYV/T

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks