General

  • Target

    3032480b6aec9d1c9e323ff1202e8c2590f6c1c46ad2bfa434150249b1f8682e

  • Size

    123KB

  • Sample

    221124-e27r3shb39

  • MD5

    f120c5bdb3acad1d08f1aaa63fb9fd32

  • SHA1

    e588db473035d7395f921839a3719438a0e80479

  • SHA256

    3032480b6aec9d1c9e323ff1202e8c2590f6c1c46ad2bfa434150249b1f8682e

  • SHA512

    66acfabd066f676f55cbed4e236e97800f68eb496fb6814a49a93f97236593268b0e6dd7d9db6243006e82be6c0170d75c535a7dd86a5d69995dd48491fa1162

  • SSDEEP

    3072:2Jmtdlgxj02MUt7V3omttXcg4neXgHwdy9wjG1Edm:2stjmy2emM5ewHwFGH

Score
7/10

Malware Config

Targets

    • Target

      rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe

    • Size

      172KB

    • MD5

      3ada1995cb02ba07cef2945787a57faf

    • SHA1

      30400c428672eb2a59d4918d3baae1222fe42f8d

    • SHA256

      0dced79cf4907bf2e71caeebc12da6154cc08b4eacd68b62bbf902d4863b8a33

    • SHA512

      61e4529df5e70bdf1bc18c81958a71173d99bb21a42c72c262aa2f9a31eeef3fc3206b5e983f7c7c22cabe7c8dd0ff35646ca4e5d1af98b2d3d035d288415395

    • SSDEEP

      3072:4ac9gOdj02MUt7V3oyttXcg4neXgHwcZ+hHiIkJ:4b9Zy2eyM5ewHw2+h

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks