General

  • Target

    2a5f8da837a8cb94a556b090b05b06d2805e20cdf78d01cfb5f65d06b0268e3c

  • Size

    212KB

  • Sample

    240114-rvmvjsceb9

  • MD5

    31a46a27aa677a184b1010ddc68c2ada

  • SHA1

    73818a6b0035e812b8cfe3fe771cd403693709b5

  • SHA256

    2a5f8da837a8cb94a556b090b05b06d2805e20cdf78d01cfb5f65d06b0268e3c

  • SHA512

    c8106ad1107bb2320c8bd52fdcb88d6d380e804a94602273f8327c0a7b2eee5a650fbf057067a4d33ba35515d8a2997e41d4eafc22ac56ec857830ef81918e54

  • SSDEEP

    3072:Jn7jBZSl+I7ZaKZAbTXAjS6jXEGnNxzjXlvl22KDInmXH5O0z9:Jn7j/CU2/jSCEGNdjXlvlxKDI6Dz

Score
10/10

Malware Config

Targets

    • Target

      2a5f8da837a8cb94a556b090b05b06d2805e20cdf78d01cfb5f65d06b0268e3c

    • Size

      212KB

    • MD5

      31a46a27aa677a184b1010ddc68c2ada

    • SHA1

      73818a6b0035e812b8cfe3fe771cd403693709b5

    • SHA256

      2a5f8da837a8cb94a556b090b05b06d2805e20cdf78d01cfb5f65d06b0268e3c

    • SHA512

      c8106ad1107bb2320c8bd52fdcb88d6d380e804a94602273f8327c0a7b2eee5a650fbf057067a4d33ba35515d8a2997e41d4eafc22ac56ec857830ef81918e54

    • SSDEEP

      3072:Jn7jBZSl+I7ZaKZAbTXAjS6jXEGnNxzjXlvl22KDInmXH5O0z9:Jn7j/CU2/jSCEGNdjXlvlxKDI6Dz

    Score
    10/10
    • Detects PlugX payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks