General

  • Target

    206d066931e30709654f959f63832739

  • Size

    31KB

  • Sample

    231225-bt7kkabbe7

  • MD5

    206d066931e30709654f959f63832739

  • SHA1

    d594f8a9c9eb1e49bd759a44c76cd976c1db4c63

  • SHA256

    c6e2a2676a36a69e2dbab849944744c8fbcfc8a366d68158ebfe6ee6e13869ef

  • SHA512

    22a3e9a1298473c5fc16060a15f7b168324a6ded23b5165b5ddf7a9b04e4c72de8eb5c1f193418730b4a82604c8b72424dcad480f9a983e5e0b35e8fede98f2b

  • SSDEEP

    768:5pj6z/jZjEGWbqQiBAtCIOgDvY70788MiTZ:76bVERfiB6CngYM88MiTZ

Score
10/10

Malware Config

Targets

    • Target

      206d066931e30709654f959f63832739

    • Size

      31KB

    • MD5

      206d066931e30709654f959f63832739

    • SHA1

      d594f8a9c9eb1e49bd759a44c76cd976c1db4c63

    • SHA256

      c6e2a2676a36a69e2dbab849944744c8fbcfc8a366d68158ebfe6ee6e13869ef

    • SHA512

      22a3e9a1298473c5fc16060a15f7b168324a6ded23b5165b5ddf7a9b04e4c72de8eb5c1f193418730b4a82604c8b72424dcad480f9a983e5e0b35e8fede98f2b

    • SSDEEP

      768:5pj6z/jZjEGWbqQiBAtCIOgDvY70788MiTZ:76bVERfiB6CngYM88MiTZ

    Score
    10/10
    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks