General

  • Target

    a2865aeab1b7e3eabdf29e28418367db2c4557688de72e2b50ddad889fa1879d

  • Size

    113KB

  • Sample

    221124-f5qteaeg8s

  • MD5

    c6b623f39c4244f782ef528861d6777f

  • SHA1

    54a63d7d871d04c885f9c613fbac3b526d6a3c94

  • SHA256

    a2865aeab1b7e3eabdf29e28418367db2c4557688de72e2b50ddad889fa1879d

  • SHA512

    9e2c00a448e2c66592c0a76a557afc94ad7e302b572fdc999709ca951d5f6a231443d5c7c61030070d2a585e690a6dea0f627ece70c9ca0c4141fb6f5de2483f

  • SSDEEP

    3072:vJw4xZm4YFWt8wUQeNkA7DjqkYKGUfaUU8EoyDEcwG:vW4O4YFoNeKw0erqYI

Score
7/10

Malware Config

Targets

    • Target

      rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe

    • Size

      171KB

    • MD5

      a804f34778af2e79285fc1322f1b412e

    • SHA1

      072450802be854e19fdf8e84b153e64acf37e61d

    • SHA256

      787a3ec22002c515ea6093e691c4578d3872cd0e24db671122d65b19e491036b

    • SHA512

      306748ac10dcc89af61d4b52f753ba44f4741a2b7b597de8bbce867cd1055640288b8e9f7cd77ebbb2f80c3bacdf3b01097c7eeb95f19285dc807e5fbc46aa9e

    • SSDEEP

      3072:igpd+HKWTnOwsDBY4XAHNycjNtTUhx0faUU8EoyDElkCd:igpMHKWTDun+DU6rqYlv

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks