General

  • Target

    193460b43722438a162df4b740d8ccd4

  • Size

    692KB

  • Sample

    231230-p6v9yseha3

  • MD5

    193460b43722438a162df4b740d8ccd4

  • SHA1

    adde849ff2ebd5ab85bdb4075b6ba812fc1f01e7

  • SHA256

    87e02f29fe50e052f7fb2f65f7795484eb7ae6c41859c755fc5f86e81de6f020

  • SHA512

    35443ba627bfb07f36b2b9e4d4fedb27de861666ba21781237d66313d06825f542fe5992cc03e7f5eb82b4df858169c273377ca8df37a320e61a80f4da6a93dd

  • SSDEEP

    12288:P/uAGTo28+SCyqzQSTorJoBrcN6kNupgt2JxloBgl:P/uAa8vcDcrKBrUxcdJxlo2

Score
7/10

Malware Config

Targets

    • Target

      193460b43722438a162df4b740d8ccd4

    • Size

      692KB

    • MD5

      193460b43722438a162df4b740d8ccd4

    • SHA1

      adde849ff2ebd5ab85bdb4075b6ba812fc1f01e7

    • SHA256

      87e02f29fe50e052f7fb2f65f7795484eb7ae6c41859c755fc5f86e81de6f020

    • SHA512

      35443ba627bfb07f36b2b9e4d4fedb27de861666ba21781237d66313d06825f542fe5992cc03e7f5eb82b4df858169c273377ca8df37a320e61a80f4da6a93dd

    • SSDEEP

      12288:P/uAGTo28+SCyqzQSTorJoBrcN6kNupgt2JxloBgl:P/uAa8vcDcrKBrUxcdJxlo2

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Tasks