General

  • Target

    3a1f9e592937513387c9c1880f795757

  • Size

    156KB

  • Sample

    231231-r2cm6afhfp

  • MD5

    3a1f9e592937513387c9c1880f795757

  • SHA1

    421b648186fb7be8e35c752f0aebf49aa0b702cb

  • SHA256

    90922294e0c48386680d8bd3aa24f571746f2413c401c8b5e40a10e5dac859f2

  • SHA512

    76a7693e5aaaabc25b1a9b036400617feeed5942cdae7fba9a8f5cccec22ab53140bd25f5f8e1a943a77dd49a02a49d03e4f3a62ae01e2d69b4be94185be5866

  • SSDEEP

    3072:Z612XVqqVIAlGDInCOx7EVgeLCStSrsfp4ZdWh9NRI+JcMb8tyvl9RXECagIQCs7:I1MTZNiLCSSrc4ZdWh9tqit9WgFTDN1h

Score
7/10

Malware Config

Targets

    • Target

      3a1f9e592937513387c9c1880f795757

    • Size

      156KB

    • MD5

      3a1f9e592937513387c9c1880f795757

    • SHA1

      421b648186fb7be8e35c752f0aebf49aa0b702cb

    • SHA256

      90922294e0c48386680d8bd3aa24f571746f2413c401c8b5e40a10e5dac859f2

    • SHA512

      76a7693e5aaaabc25b1a9b036400617feeed5942cdae7fba9a8f5cccec22ab53140bd25f5f8e1a943a77dd49a02a49d03e4f3a62ae01e2d69b4be94185be5866

    • SSDEEP

      3072:Z612XVqqVIAlGDInCOx7EVgeLCStSrsfp4ZdWh9NRI+JcMb8tyvl9RXECagIQCs7:I1MTZNiLCSSrc4ZdWh9tqit9WgFTDN1h

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Tasks