General

  • Target

    5961ba3798d8753956cad1ba2f751f2fc6d42b866169416c1a79a7fc7d020477

  • Size

    118KB

  • Sample

    221124-gexdyafe2t

  • MD5

    30674476f1ff9eb73255c3bc96982882

  • SHA1

    8ffccd3d7590c99072f552796d6b655a0669e579

  • SHA256

    5961ba3798d8753956cad1ba2f751f2fc6d42b866169416c1a79a7fc7d020477

  • SHA512

    f2aacdd7d804afbb7b687510ded20d717b53c9c0adbe6dc7adf9afde6fd3e2ef8119faca23f53f36f111388d6ba487f50ca22af3fa53a0f1a8379bc2478a4367

  • SSDEEP

    3072:Tvis9yKT2qhQkGmgb6/d3JHfI5NxwCshg0eOFmvr:TvJ4KiaQkG7Gv/IzbyeOUz

Score
7/10

Malware Config

Targets

    • Target

      2014_11vodafone_onlinerechnung_0020003909_november_3903980009_11_00000000445.exe

    • Size

      148KB

    • MD5

      69a462f5962e03c6dc1d34b3ec702ef7

    • SHA1

      42a898eb901252f9839b3376e91c80eb508ecf40

    • SHA256

      7cad924cac4762e897aa2d5406cf63083e9d44d86f61cdde86946e0419746a2c

    • SHA512

      252f8baabb0f160c2886b8d781a55ac747fc443029428929e52d42974eb8bbcc362181b8813c45a91d21dde405859943dd59d148d5f4bb04a5e44e02cca9260f

    • SSDEEP

      3072:xQ/LFEPXCmqhQkGmgb6/d33HfI5NxwCshg0e4FeV3q0E:iTePXBaQkG7G5/Izbye4oVq0

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks