General

  • Target

    ee235aa7704ce597d7aaf3248dca105f1754e410041b5be3e83bc5d86529fd87

  • Size

    134KB

  • Sample

    221124-ezecraca9t

  • MD5

    136f2a7719f453f4f4bfd97ada7c6c5c

  • SHA1

    a8f73b8384fc747a805ff53248232b25e7745525

  • SHA256

    ee235aa7704ce597d7aaf3248dca105f1754e410041b5be3e83bc5d86529fd87

  • SHA512

    e3fbd3ef7fb94fdb203773761f33d677f4457891500e9b7a4735aa0f456bc5cc0795a9e92672ba6f3878fe4fec36bdad82f12dfac3254b6bf6ac76b1987c1b35

  • SSDEEP

    3072:OAW4fPV687SIm8raMol/Lg7Qir8d/xjcbfMrRP6lhDqPCm:rWGPV687SnzU+/F08P6zDqPCm

Score
7/10

Malware Config

Targets

    • Target

      rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe

    • Size

      188KB

    • MD5

      e3ace455382fa7708264257983339263

    • SHA1

      ab979cc544c46903d41fe773c568e2fa54a9bc44

    • SHA256

      f2d682b9bd2857603944471a9baf4a8d83a897d7be57dbf473c8f07fd8f5ed1a

    • SHA512

      be4a8e0770d30eb888a27490954b6109353673234f3b30b3c384d624ff79f3171a3ffff310883cb2f0930f0c64edb716171a78b3a166b44d855c08a0742c46ff

    • SSDEEP

      3072:gudusODvGZVHhS1drkr3k1hsz3F8ol/Lg7Qir8B/xjcbfMrRPyczWIqT9tYhOddx:k9+phSzOFUs/F08PLWIqT2M

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks