General

  • Target

    20112023_1856_17112023_2229_Anesthesiology.zip

  • Size

    1.1MB

  • Sample

    231120-m12tfafe39

  • MD5

    bbf64075352c29f415f5314fce09833b

  • SHA1

    10c9edb2e2a658ecc88c29caf885a48a71117f60

  • SHA256

    8d3b8979ac9f98fb7e916ac475acf978dbbcd61d2716a7fc7c47da7f03bd100b

  • SHA512

    c5a92b6d3925477257d062fb08e1505a6f3f3f66fb6a2428b22bc2093e25bd2ca92dc2946e27443e432ccf23435394aa3bdad225159a4cc8d113f81223aa979b

  • SSDEEP

    24576:V4xs7ZOySV+uogGPIpFY+Y1IdV2pmEsZpi11q:Vescy4fGApFY31IAAZpO1q

Score
10/10

Malware Config

Targets

    • Target

      17112023_2229_Anesthesiology.dll

    • Size

      1.6MB

    • MD5

      ee8ecace1c6a2a5f112de7261051080a

    • SHA1

      5c11b97e44d7b6684a5b3781aa676019ee436c88

    • SHA256

      e88d394fbf29fec83a119f86f2c338a3c9997872b971294d973c16f65c53f0a6

    • SHA512

      6a76144b7600b184aee25e7b8ea18fd272f28c5651ad61362afde330e3b09991fa365fb0866f27cafe451de04db2067f60024902d77d276054c90f2bd8ab49dc

    • SSDEEP

      24576:JeC6d4Qm5o9dF1rT/ygBLOiaucihUZ5tU80IYabEnNSeyPUFrPmnrw13QiGGAK8B:IvZ9djrT/HLlvIYabSymLyQYGAHgO

    Score
    1/10
    • Target

      launcher.bat

    • Size

      62B

    • MD5

      ca26c2116e48ff8168a0dfea335e0ba7

    • SHA1

      ad430bfff4a4b47bc7b62786bf117fa8e26440f9

    • SHA256

      acc454e4126e9809f4e44f13bf28eaeb20deab377182b579a11fcfbc480da50a

    • SHA512

      dae2de54f44777203714deecf057a79ce1e24b446985bea7126f8bc020b64b5c8e17df6a8c27502081b21ee93a4ed9eef05103f73260390de7756b7a6eab7fab

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks