General

  • Target

    67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c

  • Size

    174KB

  • Sample

    221201-eqhc2scg86

  • MD5

    d21910dbe30fae3c1bb0f457f515c029

  • SHA1

    8d1550542ac7087cb28f29746c165f1b9837a2fd

  • SHA256

    67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c

  • SHA512

    0f9e9d33fe6b80eae22f1709c54e0dfd15fb9be5d0054f56a9f2b62a8ede40f8d63ffda1bf13b5767cc6e0a342fa51706df4574d520ac423fafced214b7c55be

  • SSDEEP

    3072:iNBQfRRWC9+qHZxIVZtcvq1LfVmUgeuelJY3D4mkxbS5pePl/dZP3Vlv2Pw:dfRb+KIVfjD4u1uz4c5p4/Hllv2Pw

Score
8/10

Malware Config

Targets

    • Target

      67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c

    • Size

      174KB

    • MD5

      d21910dbe30fae3c1bb0f457f515c029

    • SHA1

      8d1550542ac7087cb28f29746c165f1b9837a2fd

    • SHA256

      67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c

    • SHA512

      0f9e9d33fe6b80eae22f1709c54e0dfd15fb9be5d0054f56a9f2b62a8ede40f8d63ffda1bf13b5767cc6e0a342fa51706df4574d520ac423fafced214b7c55be

    • SSDEEP

      3072:iNBQfRRWC9+qHZxIVZtcvq1LfVmUgeuelJY3D4mkxbS5pePl/dZP3Vlv2Pw:dfRb+KIVfjD4u1uz4c5p4/Hllv2Pw

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks