General

  • Target

    e150303e8c822ffad7b1f6dc1de7dda37fc9885935bc01125dce7d84e5c7455a

  • Size

    171KB

  • Sample

    221125-hpwqtshd68

  • MD5

    4420b6a879b7640a697075178e0747d0

  • SHA1

    7e821fd773b32101dd6e0acab39155061cc6f6d4

  • SHA256

    e150303e8c822ffad7b1f6dc1de7dda37fc9885935bc01125dce7d84e5c7455a

  • SHA512

    bd83917504517aec8067f26b49a23af600dbed6174b572eda5bb1e1413ebca349e3eff94154bb7775aebfffe152eda28d4a5a3362f27042ef862dacc1000e491

  • SSDEEP

    3072:DQT7R5BszJrSGY9JLiQklkXxy08q48+39Kb1btJ3Snq:cT7R5Bk6QiEspbnG

Score
8/10

Malware Config

Targets

    • Target

      e150303e8c822ffad7b1f6dc1de7dda37fc9885935bc01125dce7d84e5c7455a

    • Size

      171KB

    • MD5

      4420b6a879b7640a697075178e0747d0

    • SHA1

      7e821fd773b32101dd6e0acab39155061cc6f6d4

    • SHA256

      e150303e8c822ffad7b1f6dc1de7dda37fc9885935bc01125dce7d84e5c7455a

    • SHA512

      bd83917504517aec8067f26b49a23af600dbed6174b572eda5bb1e1413ebca349e3eff94154bb7775aebfffe152eda28d4a5a3362f27042ef862dacc1000e491

    • SSDEEP

      3072:DQT7R5BszJrSGY9JLiQklkXxy08q48+39Kb1btJ3Snq:cT7R5Bk6QiEspbnG

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks