General
-
Target
f940b8b3fcf66b2237e7a4c10f690d59c7f7ac91ca080e62b141315e84578e5f
-
Size
1.4MB
-
Sample
230803-ha37csbg22
-
MD5
e2c85abecd2506ab50f2ffd7ef578b5f
-
SHA1
56ea030ce57a35dcfbc8ac683f80011dcbdf0fe5
-
SHA256
f940b8b3fcf66b2237e7a4c10f690d59c7f7ac91ca080e62b141315e84578e5f
-
SHA512
ce3804f042c92d950e9469e30fde6d82d77d79653683a0f5ebe0ed46783ec62ef0688799244e626c41bb9952d017604a64374b59e652a97a1aa9b11f1b6b8bdd
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Static task
static1
Behavioral task
behavioral1
Sample
f940b8b3fcf66b2237e7a4c10f690d59c7f7ac91ca080e62b141315e84578e5f.exe
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
f940b8b3fcf66b2237e7a4c10f690d59c7f7ac91ca080e62b141315e84578e5f
-
Size
1.4MB
-
MD5
e2c85abecd2506ab50f2ffd7ef578b5f
-
SHA1
56ea030ce57a35dcfbc8ac683f80011dcbdf0fe5
-
SHA256
f940b8b3fcf66b2237e7a4c10f690d59c7f7ac91ca080e62b141315e84578e5f
-
SHA512
ce3804f042c92d950e9469e30fde6d82d77d79653683a0f5ebe0ed46783ec62ef0688799244e626c41bb9952d017604a64374b59e652a97a1aa9b11f1b6b8bdd
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Score8/10-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1