General

  • Target

    06c82d77f49404f64d57b24e4a54b878

  • Size

    38KB

  • Sample

    231225-frrtjsdeg2

  • MD5

    06c82d77f49404f64d57b24e4a54b878

  • SHA1

    4b329f5b84976222846ad93463d8ecd12e51af35

  • SHA256

    458c2f9eba6290c2f97499213381463af2dace64a73f02ac8c44f1fc96a8f1d7

  • SHA512

    2761cff24c1779ca0af8f256484186906f753c294ec7e78cff9a5e53721d9fe7bce94d65e86e97f60774d8ae396b58da2cb080c84879ed9d1c509cc7e1724cc4

  • SSDEEP

    768:qdjv9mRl5R+QS7JPj5EiveMIGjwXD8xtk1+DxQh:+gBXINmimhK8c8

Score
7/10

Malware Config

Targets

    • Target

      06c82d77f49404f64d57b24e4a54b878

    • Size

      38KB

    • MD5

      06c82d77f49404f64d57b24e4a54b878

    • SHA1

      4b329f5b84976222846ad93463d8ecd12e51af35

    • SHA256

      458c2f9eba6290c2f97499213381463af2dace64a73f02ac8c44f1fc96a8f1d7

    • SHA512

      2761cff24c1779ca0af8f256484186906f753c294ec7e78cff9a5e53721d9fe7bce94d65e86e97f60774d8ae396b58da2cb080c84879ed9d1c509cc7e1724cc4

    • SSDEEP

      768:qdjv9mRl5R+QS7JPj5EiveMIGjwXD8xtk1+DxQh:+gBXINmimhK8c8

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks