General

  • Target

    e481067040bb01de2f58ee4e709a247f

  • Size

    1.6MB

  • Sample

    231222-tfnjmsegg9

  • MD5

    e481067040bb01de2f58ee4e709a247f

  • SHA1

    4b054e3f0ab86ee8d86a38e9a2830df2f45045a1

  • SHA256

    b7cf910f87da6e431ce5ebe55c5be5b8bac9cb5987cf4dd278101ecd5a29b907

  • SHA512

    b23f1d0f57dc5f4f06ed84c6996979b24925d1e172cf2232357b208073eef661177fdfee16e60fb56dd5d655e2669315ceaddb9335573004afec0d3beec56945

  • SSDEEP

    49152:vZjoKdGMdzfcakLz06Jrwko6ISSpSefcakLz0O:vZjoK4Mdbcakc+sBvxcakcO

Score
7/10
upx

Malware Config

Targets

    • Target

      e481067040bb01de2f58ee4e709a247f

    • Size

      1.6MB

    • MD5

      e481067040bb01de2f58ee4e709a247f

    • SHA1

      4b054e3f0ab86ee8d86a38e9a2830df2f45045a1

    • SHA256

      b7cf910f87da6e431ce5ebe55c5be5b8bac9cb5987cf4dd278101ecd5a29b907

    • SHA512

      b23f1d0f57dc5f4f06ed84c6996979b24925d1e172cf2232357b208073eef661177fdfee16e60fb56dd5d655e2669315ceaddb9335573004afec0d3beec56945

    • SSDEEP

      49152:vZjoKdGMdzfcakLz06Jrwko6ISSpSefcakLz0O:vZjoK4Mdbcakc+sBvxcakcO

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks