General

  • Target

    51db87bd259c144a2f8502be3a964d32.bin

  • Size

    1.4MB

  • Sample

    230116-y2vx3agg9t

  • MD5

    2ac445ebc34b1a3aadff8e46a50af649

  • SHA1

    3dfa4630733e83760b9855771438a2d8c099e858

  • SHA256

    6331c2ebcad7a87ce5f6385c2bf7b4936b9256b1fa007aa89c30463cd84ca8a3

  • SHA512

    ee7890075327c1a848cbc28ac140afe9edf2689e1df72cb62788089b88175a637488217806050cd11cd90a93f6e3018d9862ec4bf870cdb18ef427941775d27e

  • SSDEEP

    24576:jYtwIxhH0pN7FgJ0Sv4PvTVNLNq+rNxBJhN3ydxpKVTq++:mhUpNZW4PvnLNnBJhVyXph7

Score
10/10

Malware Config

Targets

    • Target

      67c31c5794f8158756745a674e28f5412c81f3109d1af2cbcc2ad91f649ed954.exe

    • Size

      1.9MB

    • MD5

      51db87bd259c144a2f8502be3a964d32

    • SHA1

      999cdf0c67555c620da7c311d4be77fb19932b59

    • SHA256

      67c31c5794f8158756745a674e28f5412c81f3109d1af2cbcc2ad91f649ed954

    • SHA512

      0873340d9b0d683a8fea0ab61ef6e3931bf93de78a6b64ff2337a831bda982aa9cead3105a6876275b0f3f67f9c0131e9400e4ded69ab55278aea524c36397b0

    • SSDEEP

      49152:JaBIOU793vSNKyqwTyxRLloBY/2Aq7ppL99YZnfXT:JHzx36NKylTyxRLlmY/2Aq9pL4Znfj

    Score
    10/10
    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks