General

  • Target

    ec021c01776c7e86e836ae56f331b88196a5024589b3a0a811b7c8aebacdc116

  • Size

    1.5MB

  • Sample

    221127-tm7absed3y

  • MD5

    849a766ef139b1c82e4cc8541fbb1c1c

  • SHA1

    2d3dfa8517778130e507be7b58f1a96ea7c210ad

  • SHA256

    ec021c01776c7e86e836ae56f331b88196a5024589b3a0a811b7c8aebacdc116

  • SHA512

    c48bc320d04f5daf612784841a8a47cf544555803076d8933340636b986ec6babf144cc7704e2115b997dc10507eeaf2049239a90ec9b76b8670c90091207b5d

  • SSDEEP

    6144:GXkWpMQwzjCZl13fTS5W3tc7T1rdEjVJ3D:GXNMQ1ZDfTS5eccjVBD

Score
8/10

Malware Config

Targets

    • Target

      ec021c01776c7e86e836ae56f331b88196a5024589b3a0a811b7c8aebacdc116

    • Size

      1.5MB

    • MD5

      849a766ef139b1c82e4cc8541fbb1c1c

    • SHA1

      2d3dfa8517778130e507be7b58f1a96ea7c210ad

    • SHA256

      ec021c01776c7e86e836ae56f331b88196a5024589b3a0a811b7c8aebacdc116

    • SHA512

      c48bc320d04f5daf612784841a8a47cf544555803076d8933340636b986ec6babf144cc7704e2115b997dc10507eeaf2049239a90ec9b76b8670c90091207b5d

    • SSDEEP

      6144:GXkWpMQwzjCZl13fTS5W3tc7T1rdEjVJ3D:GXNMQ1ZDfTS5eccjVBD

    Score
    8/10
    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Tasks