General
-
Target
c5285f37b2bfdf80f1b5c7fdbeb3464ae61e2438c12241c0c3b7097d28af70f7
-
Size
1.4MB
-
Sample
230801-he57hsdh73
-
MD5
d2e6fdb39157d588133bad4225000488
-
SHA1
551e5d6f2599dc10a17d19f3eccaad90b3f2d4a2
-
SHA256
c5285f37b2bfdf80f1b5c7fdbeb3464ae61e2438c12241c0c3b7097d28af70f7
-
SHA512
79cf937e5b2d052584dc89074ab9a9a5e8a769b10666452186258e53b79166cebb5e0342dcc96384b674abdf475e70f34165e99e84b6c05dd42a4126613de301
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Static task
static1
Behavioral task
behavioral1
Sample
c5285f37b2bfdf80f1b5c7fdbeb3464ae61e2438c12241c0c3b7097d28af70f7.exe
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
c5285f37b2bfdf80f1b5c7fdbeb3464ae61e2438c12241c0c3b7097d28af70f7
-
Size
1.4MB
-
MD5
d2e6fdb39157d588133bad4225000488
-
SHA1
551e5d6f2599dc10a17d19f3eccaad90b3f2d4a2
-
SHA256
c5285f37b2bfdf80f1b5c7fdbeb3464ae61e2438c12241c0c3b7097d28af70f7
-
SHA512
79cf937e5b2d052584dc89074ab9a9a5e8a769b10666452186258e53b79166cebb5e0342dcc96384b674abdf475e70f34165e99e84b6c05dd42a4126613de301
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Score8/10-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1