General
-
Target
16c10521e4d5f56ea405fdc6b2bdb6977c3bc75f6550615a02f967e5dcf370df
-
Size
3MB
-
Sample
230202-n7hvksgb22
-
MD5
785700a5fb5c91d8a96b19f755aa72b6
-
SHA1
ed5c96fb514467f0e7ab217d4da4189d3affb560
-
SHA256
16c10521e4d5f56ea405fdc6b2bdb6977c3bc75f6550615a02f967e5dcf370df
-
SHA512
120105bf9e6f224b28015ac230f27027fa2586fbc718dfa15108181847e4eb04df65d5fcdba2c85f894c9e3334bbf7c9afa260f6d86f6ce9ff73fbcdcdd94aa8
-
SSDEEP
98304:kKSybp/tyeGPyMfPx5cH3hM5EeTXadChs:HSyFGjjcH33dh
Static task
static1
Malware Config
Targets
-
-
Target
16c10521e4d5f56ea405fdc6b2bdb6977c3bc75f6550615a02f967e5dcf370df
-
Size
3MB
-
MD5
785700a5fb5c91d8a96b19f755aa72b6
-
SHA1
ed5c96fb514467f0e7ab217d4da4189d3affb560
-
SHA256
16c10521e4d5f56ea405fdc6b2bdb6977c3bc75f6550615a02f967e5dcf370df
-
SHA512
120105bf9e6f224b28015ac230f27027fa2586fbc718dfa15108181847e4eb04df65d5fcdba2c85f894c9e3334bbf7c9afa260f6d86f6ce9ff73fbcdcdd94aa8
-
SSDEEP
98304:kKSybp/tyeGPyMfPx5cH3hM5EeTXadChs:HSyFGjjcH33dh
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Privilege Escalation