General

  • Target

    file.exe

  • Size

    1.9MB

  • Sample

    230104-ced55sgh2x

  • MD5

    3bf7bbc0f949e65080db6e99d3767e13

  • SHA1

    2b3c06b550d5a2171e40a7edc390c88aa258c422

  • SHA256

    d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

  • SHA512

    d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

  • SSDEEP

    24576:ZW1YrBXOK6QQeh1551JwzQ1Ju5E0UiZTmz8rUPcMcW25SZroejHU1F1AUkd+qEu:Q1khJw8K/Z33Fh8Ku

Score
10/10

Malware Config

Targets

    • Target

      file.exe

    • Size

      1.9MB

    • MD5

      3bf7bbc0f949e65080db6e99d3767e13

    • SHA1

      2b3c06b550d5a2171e40a7edc390c88aa258c422

    • SHA256

      d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

    • SHA512

      d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

    • SSDEEP

      24576:ZW1YrBXOK6QQeh1551JwzQ1Ju5E0UiZTmz8rUPcMcW25SZroejHU1F1AUkd+qEu:Q1khJw8K/Z33Fh8Ku

    Score
    10/10
    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks