General
-
Target
ab89efb7ee031f738de023ef6706ca30b9800816ee1bb968b0e782f13dc46a59
-
Size
1.4MB
-
Sample
230807-lrg71aef76
-
MD5
6f7296ec099a19cd56d30bde531326aa
-
SHA1
22f9a8251603d53f82a01e3ab5a0e5ed9e843ee2
-
SHA256
ab89efb7ee031f738de023ef6706ca30b9800816ee1bb968b0e782f13dc46a59
-
SHA512
7e92c963d57f31f937c86c4a145c66dc5693bca5f750dadea880dc570c1898087d34e3f48b4bc0c0f7d53a5e728f96e054b3c1617ca36285b9fd19640b26bfc7
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Static task
static1
Behavioral task
behavioral1
Sample
ab89efb7ee031f738de023ef6706ca30b9800816ee1bb968b0e782f13dc46a59.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
ab89efb7ee031f738de023ef6706ca30b9800816ee1bb968b0e782f13dc46a59
-
Size
1.4MB
-
MD5
6f7296ec099a19cd56d30bde531326aa
-
SHA1
22f9a8251603d53f82a01e3ab5a0e5ed9e843ee2
-
SHA256
ab89efb7ee031f738de023ef6706ca30b9800816ee1bb968b0e782f13dc46a59
-
SHA512
7e92c963d57f31f937c86c4a145c66dc5693bca5f750dadea880dc570c1898087d34e3f48b4bc0c0f7d53a5e728f96e054b3c1617ca36285b9fd19640b26bfc7
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Score8/10-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1