General

  • Target

    c1d5e92c34b6361598232917e1e7772610d4df117f0bc242b6e1441f18e12fc9

  • Size

    210KB

  • Sample

    221124-wxts4abd47

  • MD5

    7f3c7768a83ae2c9702c28777d4cccfe

  • SHA1

    4d997152c8bafc2f44beefc7501651bd8ba4e33f

  • SHA256

    c1d5e92c34b6361598232917e1e7772610d4df117f0bc242b6e1441f18e12fc9

  • SHA512

    c92445ba4e05e8527c1d2a313447fce2cbce111d038ff3eccd9c707dba3eebabbb0746035922a76aae619dfc3048f1eee971df81dc78702cea2662697c88f918

  • SSDEEP

    6144:IMPkl+7fmc8m4YMSfQBG/zfB79TcyQJSZw6uD8t:IMPkl6fmbUfQBGl7BcyQ3gt

Score
8/10

Malware Config

Targets

    • Target

      fotoalbum.scr

    • Size

      320KB

    • MD5

      2cbbb949196ecc932278deba7fb10742

    • SHA1

      4ac0c2dd88af0d6756762555c8b9f79dcfdb6700

    • SHA256

      bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41

    • SHA512

      468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d

    • SSDEEP

      6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/

    Score
    8/10
    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks