General

  • Target

    1c481e608b35e1149d93ec1f9aefdf71

  • Size

    41KB

  • Sample

    231230-zqe8xagadj

  • MD5

    1c481e608b35e1149d93ec1f9aefdf71

  • SHA1

    69c3ba5addfd49bb1824ff15334e0422d2c1ae65

  • SHA256

    275d70db07f89259bcc478ce5da2259a0dc12b2dd630c8b0c6160e0b9a47e6bf

  • SHA512

    3cb374039bc717e53fc9fdbf9f02a56b0688f7d99d2592eeb961719ab43922551b7f89267026332fd78464f497a7864558f2952eb7bab5f01498d00be0062dc8

  • SSDEEP

    768:Bi6MbK0BYoGfqCZlySRO2woK/Z6YIhoFtQjXyEJvc8JzKZr12qhZhXX:cJWoYnqCjao/HzxCQzKZrYq5XX

Score
7/10

Malware Config

Targets

    • Target

      1c481e608b35e1149d93ec1f9aefdf71

    • Size

      41KB

    • MD5

      1c481e608b35e1149d93ec1f9aefdf71

    • SHA1

      69c3ba5addfd49bb1824ff15334e0422d2c1ae65

    • SHA256

      275d70db07f89259bcc478ce5da2259a0dc12b2dd630c8b0c6160e0b9a47e6bf

    • SHA512

      3cb374039bc717e53fc9fdbf9f02a56b0688f7d99d2592eeb961719ab43922551b7f89267026332fd78464f497a7864558f2952eb7bab5f01498d00be0062dc8

    • SSDEEP

      768:Bi6MbK0BYoGfqCZlySRO2woK/Z6YIhoFtQjXyEJvc8JzKZr12qhZhXX:cJWoYnqCjao/HzxCQzKZrYq5XX

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks