General

  • Target

    Video-Unplugging_XpVrimPZesAPXQws4E20-22100-88044.zip

  • Size

    878B

  • Sample

    230817-tm14bacc7s

  • MD5

    882e2ff1e738acabab8b52bcf25097b7

  • SHA1

    ad06698d68e0c4bcb8e7f53afd8347af62b03d68

  • SHA256

    e97c6850dadb7400f2c5170eec837ffe5cacedc14f00d57efd2d35ebd43e61b5

  • SHA512

    69f19c686e06414cb9cc5b42b10dc3be2cf1e070b496944957e37aa581f90e50403300e8154fe900be20b8cd7b4fe7da9060c07c6e3d0e6d6b2a7284ed3f62c7

Score
8/10

Malware Config

Targets

    • Target

      Video-Unplugging_XpVrimPZesAPXQws4E20-22100-88044.BAT

    • Size

      2KB

    • MD5

      3fcdfed92931f64c1c8ad882eb113488

    • SHA1

      4e29d6e0e9ce7cf4f10953c68b7a6dd1242335c2

    • SHA256

      8b068171753fd6d931020d8ce61eaf5d102a0da83060f7a5e3dda36af7aaaa71

    • SHA512

      58f3bac8aa74977691ce74d919f63ccbbbbf021c605e93a3ea60d8abdb971cf11b94447c980d58991d029dab0560b94a23a58b6b585f706e58e09127776ef036

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks