General

  • Target

    57a05ec8b4864121ec704fa85f8c4b92937f240030982a1b04ecb5dbdceb1af7

  • Size

    122KB

  • Sample

    221124-e2xbcahb24

  • MD5

    237610dd4024414ab8a73d3aebdd7f88

  • SHA1

    cb90c3a86b518cd46f7e41092accfa663623869f

  • SHA256

    57a05ec8b4864121ec704fa85f8c4b92937f240030982a1b04ecb5dbdceb1af7

  • SHA512

    ae0bb07d183fc1ecbc9409707dd238b17aa3102daa1d6c29dc2a7aa7deb269de4e18cc541e46dfeed914a65325ac3ff60211b6338e73aa9e54f411e229d113e3

  • SSDEEP

    1536:wdNTzxM+Rfk8mVKj8iy2EmkhuCyIoRTKF/cgSjGYNJCPw1QMvGaDpe7dHHZHiMsQ:wDzJINznmKpp91HMGGCPwqMBVM0zVon

Score
7/10

Malware Config

Targets

    • Target

      rechnung_vodafone_de_2014_11_930370025_023870007_11_de_0000003837_888830.exe

    • Size

      172KB

    • MD5

      b2967a3ca6cfebc2e66f4c69d19dc055

    • SHA1

      8832ee55e68abeb97738f4a62063860686246474

    • SHA256

      9c4853fb813000f747396db86faea3122e6f7395f600bef9b3bc5f6eea133a9b

    • SHA512

      00be2036a0fae86686f5de9c86f861fa534b52357636618adfb80c8edaf4ac9110fd6cca76fd7d9774ad090e0e3b2bc2d2ed71e314a4c147be8dc64c888f6e6e

    • SSDEEP

      3072:M5AvWhLGWKpp91HMGGCPwqMBV/oFPUNuG:QSWhLG5fBRPSyF

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks