General

  • Target

    ff89fc90fe7a92f6791576a7d23ee2f6565243e23c8c53337093ae7b1bf31158

  • Size

    65KB

  • Sample

    221124-bpzddscg7s

  • MD5

    347c9b77db77aa036a9b59a2ecee9270

  • SHA1

    37446fafa3be3716af70cf846322785f237cfa18

  • SHA256

    ff89fc90fe7a92f6791576a7d23ee2f6565243e23c8c53337093ae7b1bf31158

  • SHA512

    59388e08de520ad96cdfb8580620e1999b201c31f67e34a73ee1f6df3ae1f1dc0915338626b9d769d1854416cad0779ca75d3d48ad93ed636fa28aaec8423b5b

  • SSDEEP

    1536:6kFq6YpQMRQi1C10l1bOLkNaAn/Bcteel:lt8QMRQKlOLpl

Score
10/10

Malware Config

Targets

    • Target

      ff89fc90fe7a92f6791576a7d23ee2f6565243e23c8c53337093ae7b1bf31158

    • Size

      65KB

    • MD5

      347c9b77db77aa036a9b59a2ecee9270

    • SHA1

      37446fafa3be3716af70cf846322785f237cfa18

    • SHA256

      ff89fc90fe7a92f6791576a7d23ee2f6565243e23c8c53337093ae7b1bf31158

    • SHA512

      59388e08de520ad96cdfb8580620e1999b201c31f67e34a73ee1f6df3ae1f1dc0915338626b9d769d1854416cad0779ca75d3d48ad93ed636fa28aaec8423b5b

    • SSDEEP

      1536:6kFq6YpQMRQi1C10l1bOLkNaAn/Bcteel:lt8QMRQKlOLpl

    Score
    9/10
    • Nirsoft

    • Drops file in Drivers directory

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks