General

  • Target

    bd2ed5339e8e9197ce7b4f89dad52d9a29a6eb4535d65dd6f60db84c592c3565

  • Size

    74KB

  • Sample

    221124-jwrwwsdb9w

  • MD5

    e4b5a0f21acb7b00b21905fd461cbabd

  • SHA1

    fc105b6963c1723e4fe0be6e99e2064e66a3ef98

  • SHA256

    bd2ed5339e8e9197ce7b4f89dad52d9a29a6eb4535d65dd6f60db84c592c3565

  • SHA512

    dcfad64500c678981a9478d84fc1bf1233179b1902e2be3b4eef4ae546b15f7e2836b800ddf267a4fe97e2597befd9cf13232cefc1417b6f93b489bba625bec6

  • SSDEEP

    1536:C94G8k0m9X2zyx/XvxBiN0sXsPu/hw1hO8ohGMgC/:C9j2azusW/m1hwGMgM

Malware Config

Targets

    • Target

      2014_11rechnung_K4768955881_pdf_sign_telekom_de_deutschland_gmbh.pdf.exe

    • Size

      94KB

    • MD5

      dbc35cd99daa5b3f3083e911a43b7c31

    • SHA1

      dcbe9859542d22bc8684d798d9f5227624f5be97

    • SHA256

      47063fabbef0d6759cc4076c988760f82ba0328e878431cce6a3691d052e7b06

    • SHA512

      d8212148e1c5897e1c92b2eb054c9b158eafc49fb3047fe22dd01208c1384212ab388848e746f9c37e2b561975e300fe440fdc9877411f460b4cb7c9666ca641

    • SSDEEP

      1536:CvSM+QtpWT1G9NS89i4XZ0wovNOinmYbGmjBtwiRAd6S9C5Qhkxolh+:Cv3I1G9NnH8vN0eGKBqLMS9cIkxolU

    • Deletes itself

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Scanning

1
T1046

Tasks