General

  • Target

    fadde60099195e347805560c71dc69224f7d453103eea3985dcb654c9abe9720

  • Size

    17KB

  • Sample

    221204-l1brkscg7x

  • MD5

    ef4491aa43ef18680c8bc3a931c4248c

  • SHA1

    eb4ac957bc5ac99590dbd56a744a5c9495bbfd0c

  • SHA256

    fadde60099195e347805560c71dc69224f7d453103eea3985dcb654c9abe9720

  • SHA512

    4c0d4823edca9e3d8216f1642fc4f2428446247d64ffd47be0111dcbcda337963db7c231ece1444a82348f070a4547734a704df46eff8dd801a71db0c20c5b7f

  • SSDEEP

    384:xGOf/+YmuxO+/04aLJiA+/i0AdGNsVRTlmV92dq:IZvCFs4aJ+XAdGaPTMt

Score
10/10

Malware Config

Targets

    • Target

      fadde60099195e347805560c71dc69224f7d453103eea3985dcb654c9abe9720

    • Size

      17KB

    • MD5

      ef4491aa43ef18680c8bc3a931c4248c

    • SHA1

      eb4ac957bc5ac99590dbd56a744a5c9495bbfd0c

    • SHA256

      fadde60099195e347805560c71dc69224f7d453103eea3985dcb654c9abe9720

    • SHA512

      4c0d4823edca9e3d8216f1642fc4f2428446247d64ffd47be0111dcbcda337963db7c231ece1444a82348f070a4547734a704df46eff8dd801a71db0c20c5b7f

    • SSDEEP

      384:xGOf/+YmuxO+/04aLJiA+/i0AdGNsVRTlmV92dq:IZvCFs4aJ+XAdGaPTMt

    Score
    10/10
    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks