General

  • Target

    24b347cf7a773f423d99c6ef1916dc31

  • Size

    193KB

  • Sample

    231231-c3lvwsagd5

  • MD5

    24b347cf7a773f423d99c6ef1916dc31

  • SHA1

    582da3b930d03aa4d73e9306603e264ab11cf341

  • SHA256

    de885b625b55838e06ae4787a4988cf5b161169050f8d0f61b742bdac6d029be

  • SHA512

    6198f86eeb88a7d611d6768035a363d76e31d4edbcca5f6b7d5cb07a6f9efc89adf7b156df6e75b7a77133de2915585147e773eb76958bbef4341fdd31f4b59f

  • SSDEEP

    3072:NPbZg7jEa87ZuefIeVEFHCzfB024hEVNj0oBRdqqTUpLRL:Df7QYI4hB0q0ylO1L

Score
7/10

Malware Config

Targets

    • Target

      24b347cf7a773f423d99c6ef1916dc31

    • Size

      193KB

    • MD5

      24b347cf7a773f423d99c6ef1916dc31

    • SHA1

      582da3b930d03aa4d73e9306603e264ab11cf341

    • SHA256

      de885b625b55838e06ae4787a4988cf5b161169050f8d0f61b742bdac6d029be

    • SHA512

      6198f86eeb88a7d611d6768035a363d76e31d4edbcca5f6b7d5cb07a6f9efc89adf7b156df6e75b7a77133de2915585147e773eb76958bbef4341fdd31f4b59f

    • SSDEEP

      3072:NPbZg7jEa87ZuefIeVEFHCzfB024hEVNj0oBRdqqTUpLRL:Df7QYI4hB0q0ylO1L

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks