General

  • Target

    ada2dead82c24c2ca0253923c95e84e6ee19ccd6f3eef612f0102f07e22ef7fb

  • Size

    190KB

  • Sample

    221206-cwhjwsbg6z

  • MD5

    4cc1088ef57e5152ff1eabebefa6d305

  • SHA1

    ab954719d0bab98a8dfa7f915da83834a614b0c7

  • SHA256

    ada2dead82c24c2ca0253923c95e84e6ee19ccd6f3eef612f0102f07e22ef7fb

  • SHA512

    097fadb24f0a7a1e9c763744a07737e4da4072d2bf5f00e5f58e58f209d7b5b17c2cd4760a0d9e8927d8965f917e5bc3f86314df6484f41c990b6b75b74f9d18

  • SSDEEP

    3072:wkyNHcz5Og+BztDemJEfOvH5kz57Ic/3VetKYhZN8/WOIdch5P:wFHUOg+77MOfaz5scSKYhiWBcrP

Score
8/10

Malware Config

Targets

    • Target

      ada2dead82c24c2ca0253923c95e84e6ee19ccd6f3eef612f0102f07e22ef7fb

    • Size

      190KB

    • MD5

      4cc1088ef57e5152ff1eabebefa6d305

    • SHA1

      ab954719d0bab98a8dfa7f915da83834a614b0c7

    • SHA256

      ada2dead82c24c2ca0253923c95e84e6ee19ccd6f3eef612f0102f07e22ef7fb

    • SHA512

      097fadb24f0a7a1e9c763744a07737e4da4072d2bf5f00e5f58e58f209d7b5b17c2cd4760a0d9e8927d8965f917e5bc3f86314df6484f41c990b6b75b74f9d18

    • SSDEEP

      3072:wkyNHcz5Og+BztDemJEfOvH5kz57Ic/3VetKYhZN8/WOIdch5P:wFHUOg+77MOfaz5scSKYhiWBcrP

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks