General

  • Target

    16fcb722a88d4c32e149a4420cfd353d

  • Size

    293KB

  • Sample

    231230-nfgs7saba3

  • MD5

    16fcb722a88d4c32e149a4420cfd353d

  • SHA1

    2fef8dcb6f23b0a0b680bccc2a546edacd072024

  • SHA256

    e07a07f6bdb162d5047a14d78e45e5489222102da72052f8e73070ab0d3ee497

  • SHA512

    81657ccdeb787ac9ca1f89a5506115f7e8aafee273619e34496158b5d2af5ca0558781803475c6d9d0ecd5c1feb9c7621b127d8ce280c971365874d3f2329607

  • SSDEEP

    6144:+PdMcMANEVzGlcEDUl4qaRYVQfJTGbusJRhgnGXcjD7Xm2BeddhMHLHa0:SNEh8cSLqdEsisDhgnGQBBedDMrHL

Score
7/10

Malware Config

Targets

    • Target

      16fcb722a88d4c32e149a4420cfd353d

    • Size

      293KB

    • MD5

      16fcb722a88d4c32e149a4420cfd353d

    • SHA1

      2fef8dcb6f23b0a0b680bccc2a546edacd072024

    • SHA256

      e07a07f6bdb162d5047a14d78e45e5489222102da72052f8e73070ab0d3ee497

    • SHA512

      81657ccdeb787ac9ca1f89a5506115f7e8aafee273619e34496158b5d2af5ca0558781803475c6d9d0ecd5c1feb9c7621b127d8ce280c971365874d3f2329607

    • SSDEEP

      6144:+PdMcMANEVzGlcEDUl4qaRYVQfJTGbusJRhgnGXcjD7Xm2BeddhMHLHa0:SNEh8cSLqdEsisDhgnGQBBedDMrHL

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks