General

  • Target

    0fa2c32060eebf4377b7c812bcd06e2c

  • Size

    49KB

  • Sample

    231224-ytfs6shdb6

  • MD5

    0fa2c32060eebf4377b7c812bcd06e2c

  • SHA1

    77b38d635963bd065fe8f4db5339fe15b47846a7

  • SHA256

    8dce833d9f135bc5d381217bd8e7390464bd18032214d8427186db7a505cf5c0

  • SHA512

    299e8535e591d5ffc7fa22d475f80a383c2d03d3de11ab1b5d34a39890c0754a4de5c0d43ef6cb4ad2eddc15b13426346fbbb371784b667c617c133c9b290f58

  • SSDEEP

    768:mCau1g2Jb8lFDKcQFWGYjcHvYO52OGnuh//HwT0+rYl2SjD943HGWX:mCau1TWflGjAO56e5uHh

Score
7/10

Malware Config

Targets

    • Target

      0fa2c32060eebf4377b7c812bcd06e2c

    • Size

      49KB

    • MD5

      0fa2c32060eebf4377b7c812bcd06e2c

    • SHA1

      77b38d635963bd065fe8f4db5339fe15b47846a7

    • SHA256

      8dce833d9f135bc5d381217bd8e7390464bd18032214d8427186db7a505cf5c0

    • SHA512

      299e8535e591d5ffc7fa22d475f80a383c2d03d3de11ab1b5d34a39890c0754a4de5c0d43ef6cb4ad2eddc15b13426346fbbb371784b667c617c133c9b290f58

    • SSDEEP

      768:mCau1g2Jb8lFDKcQFWGYjcHvYO52OGnuh//HwT0+rYl2SjD943HGWX:mCau1TWflGjAO56e5uHh

    Score
    7/10
    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks