General

  • Target

    a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4

  • Size

    198KB

  • Sample

    221201-y3dp6sgd45

  • MD5

    bfc426e0bc8e604e2222ce9ae6d326fd

  • SHA1

    7d857718fb2711f782cd95dcec052604d9987632

  • SHA256

    a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4

  • SHA512

    cec223f2b78a2d726726574461ccfe99e84c7eb5c4f07eeba5bdf407dff80885966c0ea85209dfa92dde62b229963387afacbf187dbbce03de910ae6556d4b7f

  • SSDEEP

    3072:6K2ADaRP/PSgBTvw7QbU7A0xogY4hrmZzgOJR0Dwy4enem5oaUpkqU:dh0P/6gC6UMcPrmZxJi5rCkv

Score
8/10

Malware Config

Targets

    • Target

      a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4

    • Size

      198KB

    • MD5

      bfc426e0bc8e604e2222ce9ae6d326fd

    • SHA1

      7d857718fb2711f782cd95dcec052604d9987632

    • SHA256

      a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4

    • SHA512

      cec223f2b78a2d726726574461ccfe99e84c7eb5c4f07eeba5bdf407dff80885966c0ea85209dfa92dde62b229963387afacbf187dbbce03de910ae6556d4b7f

    • SSDEEP

      3072:6K2ADaRP/PSgBTvw7QbU7A0xogY4hrmZzgOJR0Dwy4enem5oaUpkqU:dh0P/6gC6UMcPrmZxJi5rCkv

    Score
    8/10
    • Executes dropped EXE

    • Registers COM server for autorun

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks