General

  • Target

    7c607c116f82643498320a5c1ed1375affadd46cb3c8a7720941d06f69d18bee

  • Size

    196KB

  • Sample

    221201-kx4shsgb6z

  • MD5

    3e99808127936df22b6b96cbb3dc3ce2

  • SHA1

    3c3950576785bf997623542394ae7579c531ab79

  • SHA256

    7c607c116f82643498320a5c1ed1375affadd46cb3c8a7720941d06f69d18bee

  • SHA512

    6ec3dceb7496b406ff537f0a0ac1868464f2994fadab959c5ee351c0dd95cd37e68336a6b090a733ecfa9d6545fcec814186bb619151781e4fa8bff992a65bb1

  • SSDEEP

    6144:QwYgocbpP5bdjmdoJC7BvGp5yhaIlE+xPT3QAi:QlgxbpXj+oJCvRhDlrAAi

Score
10/10

Malware Config

Targets

    • Target

      7c607c116f82643498320a5c1ed1375affadd46cb3c8a7720941d06f69d18bee

    • Size

      196KB

    • MD5

      3e99808127936df22b6b96cbb3dc3ce2

    • SHA1

      3c3950576785bf997623542394ae7579c531ab79

    • SHA256

      7c607c116f82643498320a5c1ed1375affadd46cb3c8a7720941d06f69d18bee

    • SHA512

      6ec3dceb7496b406ff537f0a0ac1868464f2994fadab959c5ee351c0dd95cd37e68336a6b090a733ecfa9d6545fcec814186bb619151781e4fa8bff992a65bb1

    • SSDEEP

      6144:QwYgocbpP5bdjmdoJC7BvGp5yhaIlE+xPT3QAi:QlgxbpXj+oJCvRhDlrAAi

    Score
    10/10
    • Modifies security service

    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks