General

  • Target

    20b54556a3a3101e060d2d04621b33d5

  • Size

    157KB

  • Sample

    231230-3xmhcaaga4

  • MD5

    20b54556a3a3101e060d2d04621b33d5

  • SHA1

    a18f78bc460e15ce2f98fae4423d4856728a3a31

  • SHA256

    56c1a28f84e286c53178a2d631a1df4409bdb5fa0c0452a244ea9defc4d6d2ad

  • SHA512

    59ce38cd81a14d9a76e671dc6685702a458d2dd6021ae95f18e123782e79c0ba31356426f694b3ee7c31e16953f52afc4091aeef19367a3ef86d2b857ad5ff0b

  • SSDEEP

    3072:waFoV8RSJAm1gJ5LHRpL48eSURN5QCwJ9OcMkEeIhvryajU0of3Qw4+:waKAm1gfHR5nenTcXIH1w4

Score
7/10

Malware Config

Targets

    • Target

      20b54556a3a3101e060d2d04621b33d5

    • Size

      157KB

    • MD5

      20b54556a3a3101e060d2d04621b33d5

    • SHA1

      a18f78bc460e15ce2f98fae4423d4856728a3a31

    • SHA256

      56c1a28f84e286c53178a2d631a1df4409bdb5fa0c0452a244ea9defc4d6d2ad

    • SHA512

      59ce38cd81a14d9a76e671dc6685702a458d2dd6021ae95f18e123782e79c0ba31356426f694b3ee7c31e16953f52afc4091aeef19367a3ef86d2b857ad5ff0b

    • SSDEEP

      3072:waFoV8RSJAm1gJ5LHRpL48eSURN5QCwJ9OcMkEeIhvryajU0of3Qw4+:waKAm1gfHR5nenTcXIH1w4

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Tasks