General

  • Target

    b070f17beae802d53f2623b47912a35ce6c5bd439935d425733d7fa923d9688a

  • Size

    129KB

  • Sample

    221124-zgh87sha22

  • MD5

    53be849146297346cb2e389acd322629

  • SHA1

    4db7b8df00b6b3bf7bd777c748ea7297b7f4d46e

  • SHA256

    b070f17beae802d53f2623b47912a35ce6c5bd439935d425733d7fa923d9688a

  • SHA512

    ed5113457c72fe833c00c28349d0a2d462cdbd56607ae4ce729d717a8c1816f49b177760702fb322884ed033121b3ff4abe3116f716805d090a2a86785d84b8d

  • SSDEEP

    3072:u0vuMIfhVvUgRh13oreqjc2K9FZn0f1MsWEjDbIpNF13H:uGdIwcheOFZ0fGL/NF9H

Score
7/10

Malware Config

Targets

    • Target

      2014_11vodafone_onlinerechnung_002120003909_november_390321980009_11_00000000445.exe

    • Size

      204KB

    • MD5

      bf08a33a6aa04fd576d4661bfe409d63

    • SHA1

      33bac2b5647c3cf464e5b2cbd7e108aa75877be9

    • SHA256

      796c421ab9d0cb0b7e2de528cc7535c3eccabb31c888a04796593654ec37a0e2

    • SHA512

      4f11e2e9e606c68afaa534f700f54706f1ce23e99c42398a09e4df7a2481a8c6b07f6ffb2d19db5b2dc2fea7e5b6488692af5eeac52e16ae2b13062d8a3c8140

    • SSDEEP

      3072:KbbbeGI6JRubMVHhRJO13oreqjc2K9FZn0f1MsWzdT6V:hGLRdVHheeOFZ0fGL16V

    Score
    7/10
    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks