General

  • Target

    0be141f64e70b88b08e6490d01718fa2

  • Size

    16.2MB

  • Sample

    231230-c32lcaddgn

  • MD5

    0be141f64e70b88b08e6490d01718fa2

  • SHA1

    9c32e1097013547d26b43470d5f0d862d058c09a

  • SHA256

    cefdef740c48781321a1d5ea1fb2e13f4b5a2c8858986b2afef44de8af51e8eb

  • SHA512

    7075fccf785cf58fb1b9e12099b7cc2bdb9600225aa25b7448011bd81ae9995227be6441231c26abbadc091f0eb29c526367a268bdf60f359a393dea35b2da37

  • SSDEEP

    24576:cVU777777777yplplplplplplplplplpr:cn

Score
7/10
upx

Malware Config

Targets

    • Target

      0be141f64e70b88b08e6490d01718fa2

    • Size

      16.2MB

    • MD5

      0be141f64e70b88b08e6490d01718fa2

    • SHA1

      9c32e1097013547d26b43470d5f0d862d058c09a

    • SHA256

      cefdef740c48781321a1d5ea1fb2e13f4b5a2c8858986b2afef44de8af51e8eb

    • SHA512

      7075fccf785cf58fb1b9e12099b7cc2bdb9600225aa25b7448011bd81ae9995227be6441231c26abbadc091f0eb29c526367a268bdf60f359a393dea35b2da37

    • SSDEEP

      24576:cVU777777777yplplplplplplplplplpr:cn

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks