General

  • Target

    37cd626f661176562059bdaf637eb43b

  • Size

    197KB

  • Sample

    231231-ql2rnsadfp

  • MD5

    37cd626f661176562059bdaf637eb43b

  • SHA1

    a7fcb192d2f8bdcf35bced17c9e993163cba4d26

  • SHA256

    38e72b0bc76acbd58ed85585ffda02a467399b2d3944532d538c4b48b63f956f

  • SHA512

    fdb4f6b87dad5edd0fb567d7bea6489e237e355bcb6e2b26254313a28867b3528a7e79f28db3ebba3503fdc59d10fd9dc21790c4aacfe7fbd978c4d5d1f9c0d4

  • SSDEEP

    3072:AonhCnzMfLE6mm7qMMmJSV9Sza/bT9DIuWijTV5dc+nEmig66v:DY4YV9SzaDTBtO+nLw6v

Score
7/10

Malware Config

Targets

    • Target

      37cd626f661176562059bdaf637eb43b

    • Size

      197KB

    • MD5

      37cd626f661176562059bdaf637eb43b

    • SHA1

      a7fcb192d2f8bdcf35bced17c9e993163cba4d26

    • SHA256

      38e72b0bc76acbd58ed85585ffda02a467399b2d3944532d538c4b48b63f956f

    • SHA512

      fdb4f6b87dad5edd0fb567d7bea6489e237e355bcb6e2b26254313a28867b3528a7e79f28db3ebba3503fdc59d10fd9dc21790c4aacfe7fbd978c4d5d1f9c0d4

    • SSDEEP

      3072:AonhCnzMfLE6mm7qMMmJSV9Sza/bT9DIuWijTV5dc+nEmig66v:DY4YV9SzaDTBtO+nLw6v

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks