General

  • Target

    4ec76b9e741586ba14413b3a5756ca12

  • Size

    221KB

  • Sample

    240109-tsn1yadhfq

  • MD5

    4ec76b9e741586ba14413b3a5756ca12

  • SHA1

    1fc5d6c3c66839d29ecf17551acecfe8e0a94c17

  • SHA256

    c401d1f8b1d3c6cb59a37c1c7974168f754fc3b922ac6bf8f83374b4609e1908

  • SHA512

    4a466548d57e6c0300665f739c50b7b135d0e1329cc35181d86a338e00213dc00071fc599818f3b70d881d7e2c2bf07ea0c305e4a57e43813ce8cf477216fd45

  • SSDEEP

    3072:pxj19yYREveOn198rGuHnpyuUDsLrEJQQKzaisXRHvXBghdtq9iwA80Jpl/LxKL:frG2rxHns5wrGisRmhdtqcHlDQ

Score
7/10

Malware Config

Targets

    • Target

      4ec76b9e741586ba14413b3a5756ca12

    • Size

      221KB

    • MD5

      4ec76b9e741586ba14413b3a5756ca12

    • SHA1

      1fc5d6c3c66839d29ecf17551acecfe8e0a94c17

    • SHA256

      c401d1f8b1d3c6cb59a37c1c7974168f754fc3b922ac6bf8f83374b4609e1908

    • SHA512

      4a466548d57e6c0300665f739c50b7b135d0e1329cc35181d86a338e00213dc00071fc599818f3b70d881d7e2c2bf07ea0c305e4a57e43813ce8cf477216fd45

    • SSDEEP

      3072:pxj19yYREveOn198rGuHnpyuUDsLrEJQQKzaisXRHvXBghdtq9iwA80Jpl/LxKL:frG2rxHns5wrGisRmhdtqcHlDQ

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks