General

  • Target

    667f26309a807ef00e3b4d193aedf9d5

  • Size

    161KB

  • Sample

    240119-bfrxysccaq

  • MD5

    667f26309a807ef00e3b4d193aedf9d5

  • SHA1

    8d3a19531380dd9f4eeb989d6df76a754bf4812a

  • SHA256

    056aebb2ab53272f975677af427ec532e952a9bfa370b95a3c1b641e4318b672

  • SHA512

    1e32b54714f2bbe25347d8cbafc992ea6d8c5d16e9fcc7352223379fcefefa7625cd6db35cc7be8cd89a9efd418f2114f40bdafd8f6c896322a14053bdd7b203

  • SSDEEP

    3072:2v+ACHDM1yHuxb9mWpXwWn4aSc0Pcg0J/MUYyymgp07KQO:ACHUVxb9mSXrSjl0Jdd7Kz

Score
7/10

Malware Config

Targets

    • Target

      667f26309a807ef00e3b4d193aedf9d5

    • Size

      161KB

    • MD5

      667f26309a807ef00e3b4d193aedf9d5

    • SHA1

      8d3a19531380dd9f4eeb989d6df76a754bf4812a

    • SHA256

      056aebb2ab53272f975677af427ec532e952a9bfa370b95a3c1b641e4318b672

    • SHA512

      1e32b54714f2bbe25347d8cbafc992ea6d8c5d16e9fcc7352223379fcefefa7625cd6db35cc7be8cd89a9efd418f2114f40bdafd8f6c896322a14053bdd7b203

    • SSDEEP

      3072:2v+ACHDM1yHuxb9mWpXwWn4aSc0Pcg0J/MUYyymgp07KQO:ACHUVxb9mSXrSjl0Jdd7Kz

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Tasks