Resubmissions

04/09/2023, 16:17

230904-trcxaahf65 8

04/09/2023, 16:11

230904-tm2d3shb3w 6

04/09/2023, 16:08

230904-tlgchshf36 6

04/09/2023, 16:02

230904-tg4bgshe94 7

04/09/2023, 15:54

230904-tclwmshe63 6

04/09/2023, 15:37

230904-s2g4bahd84 10

04/09/2023, 15:36

230904-s154ragh7z 1

General

  • Target

    hqdefault.jpg

  • Size

    16KB

  • Sample

    230904-tg4bgshe94

  • MD5

    f7479b4ca928032b822902ba4d94bcd1

  • SHA1

    d39330535f19ec89f8b479bf7226fb70fb8ea05f

  • SHA256

    a69210f7cf7946f4d7415b12efd488a24b93107cefef48ed2c23af5a0a82fc87

  • SHA512

    beea9b66fe3b120ea0053277fb9f5cfe0c5155a2fd37d1c078b0216b40615989f888e34e116cae0ecb2805901a7364ab2f3de02990f8b5deda56b00b05b35a41

  • SSDEEP

    384:+3phJT8Co9+lri2WkZBNiRmYHykRQRoBJOg:+36ZUTWuQRkQh

Score
7/10

Malware Config

Targets

    • Target

      hqdefault.jpg

    • Size

      16KB

    • MD5

      f7479b4ca928032b822902ba4d94bcd1

    • SHA1

      d39330535f19ec89f8b479bf7226fb70fb8ea05f

    • SHA256

      a69210f7cf7946f4d7415b12efd488a24b93107cefef48ed2c23af5a0a82fc87

    • SHA512

      beea9b66fe3b120ea0053277fb9f5cfe0c5155a2fd37d1c078b0216b40615989f888e34e116cae0ecb2805901a7364ab2f3de02990f8b5deda56b00b05b35a41

    • SSDEEP

      384:+3phJT8Co9+lri2WkZBNiRmYHykRQRoBJOg:+36ZUTWuQRkQh

    Score
    7/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks