General

  • Target

    e3a35c773aaf435918058955c4ec8949

  • Size

    1.6MB

  • Sample

    231222-tejjascdaj

  • MD5

    e3a35c773aaf435918058955c4ec8949

  • SHA1

    db2f272c38dc7032af630e93abfbe8ca0931df4e

  • SHA256

    72d28bf4e88b277e06dd38f8ae16d57520c84242d548d3fafb4a4adf4856c488

  • SHA512

    ec20be07a23be9c827dc18382748096ed167ac1af32353018f3e380793e62f582eb19afeab5d8a56f6db4f1d916ece97421b2236088923aa391b63c284c5f9ce

  • SSDEEP

    49152:gHy5hdWcWqwocakLz0ORk6QyG+FXn6A4+i41cakLz0O:gHyzdWDqwocakcORk6fG+FXn34+iecaw

Score
7/10
upx

Malware Config

Targets

    • Target

      e3a35c773aaf435918058955c4ec8949

    • Size

      1.6MB

    • MD5

      e3a35c773aaf435918058955c4ec8949

    • SHA1

      db2f272c38dc7032af630e93abfbe8ca0931df4e

    • SHA256

      72d28bf4e88b277e06dd38f8ae16d57520c84242d548d3fafb4a4adf4856c488

    • SHA512

      ec20be07a23be9c827dc18382748096ed167ac1af32353018f3e380793e62f582eb19afeab5d8a56f6db4f1d916ece97421b2236088923aa391b63c284c5f9ce

    • SSDEEP

      49152:gHy5hdWcWqwocakLz0ORk6QyG+FXn6A4+i41cakLz0O:gHyzdWDqwocakcORk6fG+FXn34+iecaw

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks