General

  • Target

    1ef85ad906e159b9d6c6be3b47f3f99a2a0a59abcf9b5273c93101f8c560b079

  • Size

    536KB

  • Sample

    230823-23pn8ahf6z

  • MD5

    6acf29297e25f82b49e89f4f00f5b4cf

  • SHA1

    cbc874e032b1d443427c6fe77df82bf520cc8851

  • SHA256

    1ef85ad906e159b9d6c6be3b47f3f99a2a0a59abcf9b5273c93101f8c560b079

  • SHA512

    b62fc1489ecd5b67d2d264645d3a61ad9dc79d2a574224c44cd1323993785c57085ff67873cd998f6e4909df8b387b228c6ee9f0c7f4a68988e73e39564e62f1

  • SSDEEP

    12288:QOreCbJ6z1GEnCbPLwY5ZhUXyjOkx2LIa:MCKSYYOkx2LF

Score
10/10
upx

Malware Config

Targets

    • Target

      1ef85ad906e159b9d6c6be3b47f3f99a2a0a59abcf9b5273c93101f8c560b079

    • Size

      536KB

    • MD5

      6acf29297e25f82b49e89f4f00f5b4cf

    • SHA1

      cbc874e032b1d443427c6fe77df82bf520cc8851

    • SHA256

      1ef85ad906e159b9d6c6be3b47f3f99a2a0a59abcf9b5273c93101f8c560b079

    • SHA512

      b62fc1489ecd5b67d2d264645d3a61ad9dc79d2a574224c44cd1323993785c57085ff67873cd998f6e4909df8b387b228c6ee9f0c7f4a68988e73e39564e62f1

    • SSDEEP

      12288:QOreCbJ6z1GEnCbPLwY5ZhUXyjOkx2LIa:MCKSYYOkx2LF

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks