General

  • Target

    be1ab4395f141127493d24edf65c11fcfd84ce2b49f6cbfba1a5d93da9fd642e

  • Size

    131KB

  • Sample

    221124-e6rlnacf2x

  • MD5

    c5250407074f2af2c65c581206258e22

  • SHA1

    002025cbdda17c7d53b692a8844bbddf8342f95b

  • SHA256

    be1ab4395f141127493d24edf65c11fcfd84ce2b49f6cbfba1a5d93da9fd642e

  • SHA512

    57f998734f4622003671068ab81d655bfec357928d2ad24eddbf5659d75c0fc299ed93ca41572a26973496003cad2f4e8855e252e9f9325461b0cb404805f312

  • SSDEEP

    3072:iA6gUofzsi96Up164tnYl82gGtIVcrpJkYgm:z6gN8K8iCIGtOcrLkW

Score
7/10

Malware Config

Targets

    • Target

      rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe

    • Size

      172KB

    • MD5

      c06b551f110824f92f7dd6e1e286338b

    • SHA1

      b1451aabe43b20ddfe11ba08cda0716a47cf9fe6

    • SHA256

      0fdc5af087744ec47f94d6d98b05c2f018a5b16bb097a7826f096bc6f7ffd92f

    • SHA512

      4ae0cee0c75e61be40d33635b658d3ea0e074b7f4246a037da60ee6075906583b532236e41e1a3910684b9d8b71fecbcdadc1f9249bacf94b7726818cfbdc576

    • SSDEEP

      3072:Lw0CwITzueTD9d0h06Up164tnYx82gGtjdkruyjn:LwYuzue/9+hpK8i4IGtj4

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks