General

  • Target

    4956a646aca0f57ca48cf10568510760

  • Size

    385KB

  • Sample

    231226-bvzaksbael

  • MD5

    4956a646aca0f57ca48cf10568510760

  • SHA1

    b4fac926b24c5f3fdd5d32fdd1932276eaf0b78d

  • SHA256

    31a638a281e4308919709295635ac13625e4721917026e3d2bac1d3ff57850a0

  • SHA512

    c0a67f10eef3260c50fa1242353ccc7282940149c2b9181f61a89e9679cc9721b9f3a44d84717e4245ecc7aa8bfc25adff79f3c45a25408377b879b0afcde59f

  • SSDEEP

    12288:rcxjoHHRB+sXg+slscd/LkmQy12RUC5oaLB:gxonRoDvd/ImQygRUaNB

Score
7/10

Malware Config

Targets

    • Target

      4956a646aca0f57ca48cf10568510760

    • Size

      385KB

    • MD5

      4956a646aca0f57ca48cf10568510760

    • SHA1

      b4fac926b24c5f3fdd5d32fdd1932276eaf0b78d

    • SHA256

      31a638a281e4308919709295635ac13625e4721917026e3d2bac1d3ff57850a0

    • SHA512

      c0a67f10eef3260c50fa1242353ccc7282940149c2b9181f61a89e9679cc9721b9f3a44d84717e4245ecc7aa8bfc25adff79f3c45a25408377b879b0afcde59f

    • SSDEEP

      12288:rcxjoHHRB+sXg+slscd/LkmQy12RUC5oaLB:gxonRoDvd/ImQygRUaNB

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks