General

  • Target

    23148d44349a81f97c5412533e98c4bb942636d6a1c0510a2b02f5e73003a7b0

  • Size

    143KB

  • Sample

    221124-enyl9agb23

  • MD5

    069382c0230417175a3c6bd37fa04065

  • SHA1

    63eece0572ed5e00c3f0036b4829961d9f03d3a7

  • SHA256

    23148d44349a81f97c5412533e98c4bb942636d6a1c0510a2b02f5e73003a7b0

  • SHA512

    510d16e437641287c91fed633902c16b6a09803d8746a43d29b34a27273ab2a75551c4a02d1c49ff6ba4912adb0bff8dedafb51e793926254441fddaacdc8c29

  • SSDEEP

    3072:l2Nb4Zyx1FJNf4ObPCdYZqlM8iVbgC/qxC:e46LJNgClglfiVbgC9

Score
7/10

Malware Config

Targets

    • Target

      zahlung_in_auftrag_2014_12_2_000002_000039_900002_0_1_6_928_29873565001_0003.exe

    • Size

      212KB

    • MD5

      f196726cb3ad205c35e6774f2dfc506d

    • SHA1

      3509d67230073720cd38cc5e430a6166263388c6

    • SHA256

      f3ec41acbd141572f40d6f62a2838325980d255ea17490767851bfa250e645e7

    • SHA512

      2e90a2c7ac3475ae70b41a616861ed8193ac21d95a4ad61c505d9f206645b47dc35e7ac6968bc107e1cc32a115cc2e5d2217ef06af7e8501a7989a8603e930b5

    • SSDEEP

      3072:52V3AKem3MIsNLH51FJNv4ObPCdYZcV/x6xc3AmBsB6ExmOJ85Ja:AV3Alm7sNLZLJNwCl8x93AdUEJ3

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks