General

  • Target

    48c7ebdc0c102c3abd3d2ecc8053bc71

  • Size

    458KB

  • Sample

    240107-m2eejacee5

  • MD5

    48c7ebdc0c102c3abd3d2ecc8053bc71

  • SHA1

    523c35bbf78ab08359aed26edb275614efadafb4

  • SHA256

    f1f655f0db18f12331d348bc39e1f78dbdfc1d91076a6371490a12bc352fbff4

  • SHA512

    5990997639b15ca9010117f41f82d28416eefa1912890c112a044b294d3ac0834de1672efaaec424954e88679efee37bc8a3106e02c84c8e728179692ba976c8

  • SSDEEP

    12288:mNaGcWVUXtYVpqTuXlgfTzVJ6OnYbI3exOwQO0l:FGcWU9YTqaSXR0RQpl

Score
7/10

Malware Config

Targets

    • Target

      u999.exe

    • Size

      494KB

    • MD5

      dd45ff3b146efdc64efe9213768dd522

    • SHA1

      d0bac72aff829455fb02c81be1f15b0d5d2c7f94

    • SHA256

      a4b1a761c143af4194d1c909493ea15e544d5f5a9693cab144c673dd6f1cd20d

    • SHA512

      036bf4dae20745d2ac53f76c797e4314b46b0b561245c8b098a4a545561a9e9d1341241ae18fd6fb310fcb72b9734e2089061c7d55d3680dfbeb78255aa9956d

    • SSDEEP

      6144:NuwdaoWbn0MKjlUlFhKMpq0kuXWFkypBqKSR4G3j0bp3GseGSOweL/M/FiMkx:NmoWbn9zlpqTuXWFrDqKSRdTI3GxOwYX

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks