General

  • Target

    7e8e2baa2effeacc0afa467657a526e064288824f133a41bcc6d186b25595f73

  • Size

    129KB

  • Sample

    221124-27zd8aab4w

  • MD5

    dc717cf9f208a1d55e55db0d2a078127

  • SHA1

    4f5cbefc21f2b13f6248e99ea39733083364b942

  • SHA256

    7e8e2baa2effeacc0afa467657a526e064288824f133a41bcc6d186b25595f73

  • SHA512

    1363698872a7f090f145bb400875b4948e0173b7e4105a73bf30e7b021b3e5104f1802a3ce21ce8d538cbc5679b732706a5bcb8c3de1bb9a799264afe685ff7e

  • SSDEEP

    3072:v0vuMIfhVvUgRh13oreqjc2K9FZn0f1MsWEjDbIpNF13M:vGdIwcheOFZ0fGL/NF9M

Score
7/10

Malware Config

Targets

    • Target

      2014_11vodafone_onlinerechnung_002120003909_november_390321980009_11_00000000445.exe

    • Size

      204KB

    • MD5

      bf08a33a6aa04fd576d4661bfe409d63

    • SHA1

      33bac2b5647c3cf464e5b2cbd7e108aa75877be9

    • SHA256

      796c421ab9d0cb0b7e2de528cc7535c3eccabb31c888a04796593654ec37a0e2

    • SHA512

      4f11e2e9e606c68afaa534f700f54706f1ce23e99c42398a09e4df7a2481a8c6b07f6ffb2d19db5b2dc2fea7e5b6488692af5eeac52e16ae2b13062d8a3c8140

    • SSDEEP

      3072:KbbbeGI6JRubMVHhRJO13oreqjc2K9FZn0f1MsWzdT6V:hGLRdVHheeOFZ0fGL16V

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks