General

  • Target

    1bb526244a675f6b779d7259851fa9e9

  • Size

    33KB

  • Sample

    231230-y3r8kafca7

  • MD5

    1bb526244a675f6b779d7259851fa9e9

  • SHA1

    2bbe71eb23aa8b036569c696916ae87d9fe9dc5f

  • SHA256

    69e9c7a25ad44282b7303396606a45dcc32be154540e4386ae843110a97b05b7

  • SHA512

    346a89c58ea119e129e1d0ba08f25ac91e20f68f9d10bc297e39536aaa76d42f3ddee27d98bf8cfc0cad2de46b45667979c02b010c839f2a9a5cda595d5d4774

  • SSDEEP

    768:7lIGpJ3bZy1SAP6Cb2ye/w4UbDN3jKgUjIjQ0+GtmZuAZonc:5xJLY1SAyQ2yGwRzhIGtvc

Score
7/10

Malware Config

Targets

    • Target

      1bb526244a675f6b779d7259851fa9e9

    • Size

      33KB

    • MD5

      1bb526244a675f6b779d7259851fa9e9

    • SHA1

      2bbe71eb23aa8b036569c696916ae87d9fe9dc5f

    • SHA256

      69e9c7a25ad44282b7303396606a45dcc32be154540e4386ae843110a97b05b7

    • SHA512

      346a89c58ea119e129e1d0ba08f25ac91e20f68f9d10bc297e39536aaa76d42f3ddee27d98bf8cfc0cad2de46b45667979c02b010c839f2a9a5cda595d5d4774

    • SSDEEP

      768:7lIGpJ3bZy1SAP6Cb2ye/w4UbDN3jKgUjIjQ0+GtmZuAZonc:5xJLY1SAyQ2yGwRzhIGtvc

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks