General

  • Target

    0129e67673c7c3371fea7f271a0ed748

  • Size

    39KB

  • Sample

    231224-rwqb3ahgd3

  • MD5

    0129e67673c7c3371fea7f271a0ed748

  • SHA1

    027c5ac166dc81efad124fba6804b7db1bc847c0

  • SHA256

    36beb1e7347057626b247d97f2b8669c01d0d4437877e61d1e26b470a47476dd

  • SHA512

    21ed09f7308fcf4956c2ab175a37c92d2ea590a7216c9c10f29a005818a338b68f436cf7f6df857811c4f9d8012ed31cdf8b7ba725768acc1f169fd43f154001

  • SSDEEP

    768:SzLoYj/s3MY2C162DG9pFz6uEpYJgiMgIf2aNBIFZCzccx5BXPox:0MYQ3n2WTczxqYJgHf2aNBSZ5cx5Fw

Score
7/10

Malware Config

Targets

    • Target

      0129e67673c7c3371fea7f271a0ed748

    • Size

      39KB

    • MD5

      0129e67673c7c3371fea7f271a0ed748

    • SHA1

      027c5ac166dc81efad124fba6804b7db1bc847c0

    • SHA256

      36beb1e7347057626b247d97f2b8669c01d0d4437877e61d1e26b470a47476dd

    • SHA512

      21ed09f7308fcf4956c2ab175a37c92d2ea590a7216c9c10f29a005818a338b68f436cf7f6df857811c4f9d8012ed31cdf8b7ba725768acc1f169fd43f154001

    • SSDEEP

      768:SzLoYj/s3MY2C162DG9pFz6uEpYJgiMgIf2aNBIFZCzccx5BXPox:0MYQ3n2WTczxqYJgHf2aNBSZ5cx5Fw

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks