General

  • Target

    ded3c0f1113dd9a8fc88179a8ff3360cb69caa914f84861bb4c82d5ea8bffb01

  • Size

    129KB

  • Sample

    221124-wrxykaba96

  • MD5

    87fc449753addbdeeac8ff03b2ad7eb6

  • SHA1

    7ca790fff09fcc899791e54a42f5a56be2ab927e

  • SHA256

    ded3c0f1113dd9a8fc88179a8ff3360cb69caa914f84861bb4c82d5ea8bffb01

  • SHA512

    3ade0d499e37be08bad6d6e354cd3a0fc3d51385e64010a0f5f52c84ecbec5633b175e1504a001843a428bc132275649ec6e1b4b29c7ebec1c88ba3fbf22fdb4

  • SSDEEP

    3072:j0vuMIfhVvUgRh13oreqjc2K9FZn0f1MsWEjDbIpNF13Q:jGdIwcheOFZ0fGL/NF9Q

Score
7/10

Malware Config

Targets

    • Target

      2014_11vodafone_onlinerechnung_002120003909_november_390321980009_11_00000000445.exe

    • Size

      204KB

    • MD5

      bf08a33a6aa04fd576d4661bfe409d63

    • SHA1

      33bac2b5647c3cf464e5b2cbd7e108aa75877be9

    • SHA256

      796c421ab9d0cb0b7e2de528cc7535c3eccabb31c888a04796593654ec37a0e2

    • SHA512

      4f11e2e9e606c68afaa534f700f54706f1ce23e99c42398a09e4df7a2481a8c6b07f6ffb2d19db5b2dc2fea7e5b6488692af5eeac52e16ae2b13062d8a3c8140

    • SSDEEP

      3072:KbbbeGI6JRubMVHhRJO13oreqjc2K9FZn0f1MsWzdT6V:hGLRdVHheeOFZ0fGL16V

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks