General

  • Target

    99ec9ec4d65a908e4154d6e961389117b535eb8179fd671941f912f317741aba

  • Size

    225KB

  • Sample

    221124-1pkyfabf42

  • MD5

    0040e0e665184a6f6798cbba37675b16

  • SHA1

    e7d466410f8f72676e593408284a1fa420e10302

  • SHA256

    99ec9ec4d65a908e4154d6e961389117b535eb8179fd671941f912f317741aba

  • SHA512

    66be1a95fa4677fdd16fe3704759626cb850729f45900215cf8a004a7601e42728470a3b4dd84a4dfb98d2f05336233dda54a16e5d71e787b7c295b18bbdd3c0

  • SSDEEP

    6144:So9fugZp2b5+Yu+8goNOBazN8O5O3gN9lKvJrNaVWQbH:SKmgZpfPNrL5sg4JrYBH

Malware Config

Targets

    • Target

      2014_11rechnung_K4768955881_pdf_sign_telekom_de_deutschland_gmbh.exe

    • Size

      306KB

    • MD5

      756fae3b80bf129ce578006534c1413f

    • SHA1

      00ec3c18110067acd9014a27c366160f2ea18ab3

    • SHA256

      69b81b054100dc55fa61aa0edb9acdecccb84ab84fa37177b33e5d9814067633

    • SHA512

      10274e2d15f6c7990acee9dd6b8e4d3b30c5dc810321198257671862f125baecede3cb5193468f8361d3289fb4623cb3ab6a9f0caceb780eaa6e0e4ef4d1626e

    • SSDEEP

      6144:Ci37LbbWiaYUpwXV9RIKWn/TUVs8oL48N8lqFzc+tRJShtvUdJk:CO/izXrN8UbtPShoJk

    • Deletes itself

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Scanning

1
T1046

Tasks