General

  • Target

    3f73ddf43bef7f72423397a3a7d469d3bd4c3b84f7ffa7ee0fbdbed16bbe204c

  • Size

    37KB

  • Sample

    230719-y7b25sbe9z

  • MD5

    fb85b4100eef2959e1ef86fa3be686f9

  • SHA1

    0035bb53c437d3e821c5010402ce7dca03de068b

  • SHA256

    3f73ddf43bef7f72423397a3a7d469d3bd4c3b84f7ffa7ee0fbdbed16bbe204c

  • SHA512

    ccb07610dc061d861fe3cde16049981d82715dd2576bfc7f405bf13976837337dd7ab2104cb741fef8d4983dd2f400bd0f2003eec24e6c2b3fa3df829a4edef1

  • SSDEEP

    768:VlnkNhgIGhb0+kl3M2F7Tllmu24Ra2DovIieNhIPVQPamq+:YhvGhA+B2JTll92m7ov0oWJq+

Score
10/10

Malware Config

Targets

    • Target

      3f73ddf43bef7f72423397a3a7d469d3bd4c3b84f7ffa7ee0fbdbed16bbe204c

    • Size

      37KB

    • MD5

      fb85b4100eef2959e1ef86fa3be686f9

    • SHA1

      0035bb53c437d3e821c5010402ce7dca03de068b

    • SHA256

      3f73ddf43bef7f72423397a3a7d469d3bd4c3b84f7ffa7ee0fbdbed16bbe204c

    • SHA512

      ccb07610dc061d861fe3cde16049981d82715dd2576bfc7f405bf13976837337dd7ab2104cb741fef8d4983dd2f400bd0f2003eec24e6c2b3fa3df829a4edef1

    • SSDEEP

      768:VlnkNhgIGhb0+kl3M2F7Tllmu24Ra2DovIieNhIPVQPamq+:YhvGhA+B2JTll92m7ov0oWJq+

    Score
    10/10
    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks