General

  • Target

    92c8bf75f6d2b453f57ac0463c98266e3cddf330b62723c7f3ed2ba26d7a0620

  • Size

    122KB

  • Sample

    221124-e2wptahb23

  • MD5

    c4e5d582d0ae781ce9e44846279ccb82

  • SHA1

    25bed2fa06404afa29490f771082141574cc09aa

  • SHA256

    92c8bf75f6d2b453f57ac0463c98266e3cddf330b62723c7f3ed2ba26d7a0620

  • SHA512

    65c40627d5ea781c103c8328093cfc1121c24d77193dd8be60eb76298474c284bddaa4014efbdf26b6dadfe38346041929baf361d0992d7d6b66bfc7c4876e18

  • SSDEEP

    1536:LdNTzxM+Rfk8mVKj8iy2EmkhuCyIoRTKF/cgSjGYNJCPw1QMvGaDpe7dHHZHiMsl:LDzJINznmKpp91HMGGCPwqMBVM0zVoa

Score
7/10

Malware Config

Targets

    • Target

      rechnung_vodafone_de_2014_11_930370025_023870007_11_de_0000003837_888830.exe

    • Size

      172KB

    • MD5

      b2967a3ca6cfebc2e66f4c69d19dc055

    • SHA1

      8832ee55e68abeb97738f4a62063860686246474

    • SHA256

      9c4853fb813000f747396db86faea3122e6f7395f600bef9b3bc5f6eea133a9b

    • SHA512

      00be2036a0fae86686f5de9c86f861fa534b52357636618adfb80c8edaf4ac9110fd6cca76fd7d9774ad090e0e3b2bc2d2ed71e314a4c147be8dc64c888f6e6e

    • SSDEEP

      3072:M5AvWhLGWKpp91HMGGCPwqMBV/oFPUNuG:QSWhLG5fBRPSyF

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks