General

  • Target

    3e5f636591b59b729725da24ebe1bd70

  • Size

    38KB

  • Sample

    231225-1qzszsfcdk

  • MD5

    3e5f636591b59b729725da24ebe1bd70

  • SHA1

    dc104977b7a423a9579d2b9ae99b4a346d2faa8f

  • SHA256

    e576767545a9c02e529ed6c57bd12b57c9ba473aed8b4e7e85e93119e6fd9276

  • SHA512

    ae6a1752a574782141eaf590745e0fe8d3601ab639c70e39e5cd7c23fe7ee27ae1f16e73992cfd1f9d4a9ae2ea96ad215fcfa0d5249dfe8d05d2c3fa2aa4ebd1

  • SSDEEP

    768:EoGBwgQ9xh7miRJsKue84EZ43eX/rUI/w9bbVAAtFPoIlan8K:EoGBwgc7miL85ZGWQIohZAAfm8K

Score
7/10

Malware Config

Targets

    • Target

      3e5f636591b59b729725da24ebe1bd70

    • Size

      38KB

    • MD5

      3e5f636591b59b729725da24ebe1bd70

    • SHA1

      dc104977b7a423a9579d2b9ae99b4a346d2faa8f

    • SHA256

      e576767545a9c02e529ed6c57bd12b57c9ba473aed8b4e7e85e93119e6fd9276

    • SHA512

      ae6a1752a574782141eaf590745e0fe8d3601ab639c70e39e5cd7c23fe7ee27ae1f16e73992cfd1f9d4a9ae2ea96ad215fcfa0d5249dfe8d05d2c3fa2aa4ebd1

    • SSDEEP

      768:EoGBwgQ9xh7miRJsKue84EZ43eX/rUI/w9bbVAAtFPoIlan8K:EoGBwgc7miL85ZGWQIohZAAfm8K

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks