General

  • Target

    4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1

  • Size

    206KB

  • Sample

    221201-1a43rsfg6z

  • MD5

    2f836cf1ce1308d1ddf6835493daa3ec

  • SHA1

    eccec97d7d7f7fddcc54535bd3292ccc52f79ae0

  • SHA256

    4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1

  • SHA512

    2e6faeb544bf3a5a87f63fbf654dc1a6f8e3e1acb177326ce2c57449f83b30e731511690134fb225b959233c719773841fd1f858b007eff53e947880edb134be

  • SSDEEP

    3072:vpIbl6hJZQbumFaN28iv0DquqnLWZUBm41orRV/+kA9L0l7IfGoHarQkC4OteVZJ:OYhJZQJa+sqnLr841k/Jl7ro+C4XHEM

Score
8/10

Malware Config

Targets

    • Target

      4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1

    • Size

      206KB

    • MD5

      2f836cf1ce1308d1ddf6835493daa3ec

    • SHA1

      eccec97d7d7f7fddcc54535bd3292ccc52f79ae0

    • SHA256

      4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1

    • SHA512

      2e6faeb544bf3a5a87f63fbf654dc1a6f8e3e1acb177326ce2c57449f83b30e731511690134fb225b959233c719773841fd1f858b007eff53e947880edb134be

    • SSDEEP

      3072:vpIbl6hJZQbumFaN28iv0DquqnLWZUBm41orRV/+kA9L0l7IfGoHarQkC4OteVZJ:OYhJZQJa+sqnLr841k/Jl7ro+C4XHEM

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks