General

  • Target

    60efe84ff02cdba13cb62e4d876d1863a25267a214c3a8379e54346c9c7fd5c4

  • Size

    118KB

  • Sample

    221124-p5386shf7z

  • MD5

    daa1692bdfd65c6515b286b9759def65

  • SHA1

    b2110a90376da33bf98a30ef9ef24c8bc046a801

  • SHA256

    60efe84ff02cdba13cb62e4d876d1863a25267a214c3a8379e54346c9c7fd5c4

  • SHA512

    695b40d51ad53bf687af71447b7f22faf2e164e919affeebb21673d7ca25b45b50c93ba3a1bb4379795f4faee5b495ba7d081d8c82b44ab16e58b55d9a4fe65c

  • SSDEEP

    3072:Fvis9yKT2qhQkGmgb6/d3JHfI5NxwCshg0eOFmvV:FvJ4KiaQkG7Gv/IzbyeOUt

Score
7/10

Malware Config

Targets

    • Target

      2014_11vodafone_onlinerechnung_0020003909_november_3903980009_11_00000000445.exe

    • Size

      148KB

    • MD5

      69a462f5962e03c6dc1d34b3ec702ef7

    • SHA1

      42a898eb901252f9839b3376e91c80eb508ecf40

    • SHA256

      7cad924cac4762e897aa2d5406cf63083e9d44d86f61cdde86946e0419746a2c

    • SHA512

      252f8baabb0f160c2886b8d781a55ac747fc443029428929e52d42974eb8bbcc362181b8813c45a91d21dde405859943dd59d148d5f4bb04a5e44e02cca9260f

    • SSDEEP

      3072:xQ/LFEPXCmqhQkGmgb6/d33HfI5NxwCshg0e4FeV3q0E:iTePXBaQkG7G5/Izbye4oVq0

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks