General

  • Target

    8fec024ccbda51aabb919f619863240865974cecebbf31374041709b9a32413f

  • Size

    420KB

  • Sample

    221124-175qkacg48

  • MD5

    1d82019ad98d3f4a710d7171d1bab625

  • SHA1

    81d100669b4739339ff17bbe02bc6e7ca43cb26f

  • SHA256

    8fec024ccbda51aabb919f619863240865974cecebbf31374041709b9a32413f

  • SHA512

    41b64901c21f85379ed4e7c9628968ed3537b6faf89e7b183def85e950c0d75d084315bbdf8bd963b48a0e18fa2b66333814fbc46618b7bce128aca041bc81be

  • SSDEEP

    12288:ytmKz4v1nnQfevalJtPDHjXg65vYoEkf01m:lKz4vJQfWalJtHjXgWhP08

Score
8/10

Malware Config

Targets

    • Target

      8fec024ccbda51aabb919f619863240865974cecebbf31374041709b9a32413f

    • Size

      420KB

    • MD5

      1d82019ad98d3f4a710d7171d1bab625

    • SHA1

      81d100669b4739339ff17bbe02bc6e7ca43cb26f

    • SHA256

      8fec024ccbda51aabb919f619863240865974cecebbf31374041709b9a32413f

    • SHA512

      41b64901c21f85379ed4e7c9628968ed3537b6faf89e7b183def85e950c0d75d084315bbdf8bd963b48a0e18fa2b66333814fbc46618b7bce128aca041bc81be

    • SSDEEP

      12288:ytmKz4v1nnQfevalJtPDHjXg65vYoEkf01m:lKz4vJQfWalJtHjXgWhP08

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks