General

  • Target

    Wondershare Filmora v.4.6.23617.rar

  • Size

    2.2MB

  • Sample

    230521-yx33wafa9t

  • MD5

    f8100377fd265aa55f0751e256229e6f

  • SHA1

    894d8d756783d669a7e02a14f9d2d072e45652f7

  • SHA256

    054eb338da484de8663ef5834a982dced7faf677e6c2f4c1821c9b065dd53f64

  • SHA512

    09fcc98b1843557fd979abd944e6608ed14c5e7639370409337f78678a3760df72774d4855b661f174556ca17c9817a66dec78f165f9ae9d9f92ed04630d83f6

  • SSDEEP

    49152:has8jb+Uua8porClv3MDHVVwRSrlSW6lVLcYrO/riEWQtzpgY5oHgZN:78jqU7ClErVTElbrODiEWQtVg9W

Score
8/10

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      1023.0MB

    • MD5

      62759456f17937aef1f9a8f71eace59e

    • SHA1

      575f55b016a70fe2bb2179b7680e1647bdd98802

    • SHA256

      5cea4c61038d1ab6b5307c24536cfe7ed4cfe5853de902f247a869a532979f66

    • SHA512

      2abbe5eaf48629de6f80e501b65b60ff7f9b9e1d3b5b55cd7113ad871d302a7a26f794c503ae01a6baf346c39c4b5f79599a5d9f5e67dbafb992dd17c9388874

    • SSDEEP

      6144:TsmTrYacdVTRoNxUeNfpMWQm+kT8YtSthFDU+jUKJsywG6FBuHZDINxIY5:N/8+xUedmW/eDU+jvJ6v

    Score
    8/10
    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks