General

  • Target

    24fb841fd911564455e110be09838898.exe

  • Size

    592KB

  • Sample

    230702-2jsa1adg83

  • MD5

    24fb841fd911564455e110be09838898

  • SHA1

    26cd8755406627964ffcabc8a2addb8d1b8e2e48

  • SHA256

    8dc089fd8fa7592e92ae50e19b2be9778db70fa4ca84af6f8dda27af4851faf5

  • SHA512

    40e5a47a69ff3c673dc702ea4fc1bc7f57c78631846f03e474920fe648d8f742419f4cb150d2036cdaa1a9ce8d0308be05d463a73fd1e39d8d7924e6015d7367

  • SSDEEP

    12288:Ig7K2UlLr6wvetUDTIdz0Azy1M9o+71ipwf92umFzUkuI:lZUlL2wveWvUYwb9o+ZiptucUw

Score
8/10

Malware Config

Targets

    • Target

      24fb841fd911564455e110be09838898.exe

    • Size

      592KB

    • MD5

      24fb841fd911564455e110be09838898

    • SHA1

      26cd8755406627964ffcabc8a2addb8d1b8e2e48

    • SHA256

      8dc089fd8fa7592e92ae50e19b2be9778db70fa4ca84af6f8dda27af4851faf5

    • SHA512

      40e5a47a69ff3c673dc702ea4fc1bc7f57c78631846f03e474920fe648d8f742419f4cb150d2036cdaa1a9ce8d0308be05d463a73fd1e39d8d7924e6015d7367

    • SSDEEP

      12288:Ig7K2UlLr6wvetUDTIdz0Azy1M9o+71ipwf92umFzUkuI:lZUlL2wveWvUYwb9o+ZiptucUw

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks