General
-
Target
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
Size
4MB
-
Sample
230202-gj7qgaha8w
-
MD5
36a2853761641588521ba701990aaeec
-
SHA1
a55bfcabfd3a9390f0fa8c35d92a894987dfcffd
-
SHA256
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
SHA512
ca3235aad015a2059dffeb4b6aead155c6c53a0e80399dcaee305a536bd2ee42a037bab955e2415a19ac9031cd6fd4bca85e239662440afe13fd94719d1b9230
-
SSDEEP
98304:c2WiC63QUVoC4dkRabWXp2H2LBS/2MnpALy94Gulrqb7w:cX44WabWZ2H2QvnpALym8w
Static task
static1
Malware Config
Targets
-
-
Target
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
Size
4MB
-
MD5
36a2853761641588521ba701990aaeec
-
SHA1
a55bfcabfd3a9390f0fa8c35d92a894987dfcffd
-
SHA256
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
SHA512
ca3235aad015a2059dffeb4b6aead155c6c53a0e80399dcaee305a536bd2ee42a037bab955e2415a19ac9031cd6fd4bca85e239662440afe13fd94719d1b9230
-
SSDEEP
98304:c2WiC63QUVoC4dkRabWXp2H2LBS/2MnpALy94Gulrqb7w:cX44WabWZ2H2QvnpALym8w
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Privilege Escalation