General

  • Target

    e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39

  • Size

    220KB

  • Sample

    221207-lgdrtsgg4w

  • MD5

    9ed5fddac20417cc7d033586089557e2

  • SHA1

    7d5cff8e55ddb958558c3c798f177f023d31ba1f

  • SHA256

    e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39

  • SHA512

    ebb0ffa7ea551c6928701219c9353f78588b8f8c9ccbabb14e173bc1a408991c4233f81f9822dcc3b3613effe97628fa3bbd73a8ec8332eaf231e62cc85ebad2

  • SSDEEP

    6144:BE5Sj6t+tEA0LEIm5V6ZrRN+hBcT4dng/G:C5SjzEPtGV6ZjZkdnSG

Score
8/10

Malware Config

Targets

    • Target

      e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39

    • Size

      220KB

    • MD5

      9ed5fddac20417cc7d033586089557e2

    • SHA1

      7d5cff8e55ddb958558c3c798f177f023d31ba1f

    • SHA256

      e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39

    • SHA512

      ebb0ffa7ea551c6928701219c9353f78588b8f8c9ccbabb14e173bc1a408991c4233f81f9822dcc3b3613effe97628fa3bbd73a8ec8332eaf231e62cc85ebad2

    • SSDEEP

      6144:BE5Sj6t+tEA0LEIm5V6ZrRN+hBcT4dng/G:C5SjzEPtGV6ZjZkdnSG

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks