General

  • Target

    b25630b5e9e98b78b5d1b7169dec5f5a43b8522d8d5e049541987734f9611aaf

  • Size

    131KB

  • Sample

    221124-e6ypzacf3w

  • MD5

    f26061e889d3801e008fdd694d00aaf6

  • SHA1

    e8328147b18b1d777f8bc2cb9fe9cdbfdba9f541

  • SHA256

    b25630b5e9e98b78b5d1b7169dec5f5a43b8522d8d5e049541987734f9611aaf

  • SHA512

    b5748da328bd148b085b748259af2b525482cb145771c3cef308fe87f486ddbfcfa06674294a24aec8f7f589501b83ad03c176e6901394f559aa927be5bea31d

  • SSDEEP

    3072:AA6gUofzsi96Up164tnYl82gGtIVcrpJkYgY:d6gN8K8iCIGtOcrLkI

Score
7/10

Malware Config

Targets

    • Target

      rechnungonline_telekom_000002920019_2014_11_43726700032_de_003938289_027.exe

    • Size

      172KB

    • MD5

      c06b551f110824f92f7dd6e1e286338b

    • SHA1

      b1451aabe43b20ddfe11ba08cda0716a47cf9fe6

    • SHA256

      0fdc5af087744ec47f94d6d98b05c2f018a5b16bb097a7826f096bc6f7ffd92f

    • SHA512

      4ae0cee0c75e61be40d33635b658d3ea0e074b7f4246a037da60ee6075906583b532236e41e1a3910684b9d8b71fecbcdadc1f9249bacf94b7726818cfbdc576

    • SSDEEP

      3072:Lw0CwITzueTD9d0h06Up164tnYx82gGtjdkruyjn:LwYuzue/9+hpK8i4IGtj4

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks