General

  • Target

    6fec55dc75a956e37ae5d086f929af37

  • Size

    446KB

  • Sample

    240122-wc8rhscba5

  • MD5

    6fec55dc75a956e37ae5d086f929af37

  • SHA1

    8d58a9719052f802bb27e2070954881ef7c09c92

  • SHA256

    9f1440bdc4c0d99baf43917e3d8a0a705f6efe5000eceff1ff5f1914bb3e8743

  • SHA512

    79325de7cf9a0800f8cbad6b8732c04a85265fa8be2f01ad6e3119673a45ef4788a96c1f5f7b351ade87c7f2d6be0ec28847b6e2aad4eb187f90c751f36c16b0

  • SSDEEP

    12288:tuFPFloC18cnBBy8HRoYxjufvUehTRoAFW1vm:soCTK8HvI0IT+AF3

Score
7/10

Malware Config

Targets

    • Target

      Dps Sex Scandal Online 718MB.exe

    • Size

      213KB

    • MD5

      53ce02cf446dfbe4c37c9a6045a5811e

    • SHA1

      991b146dbd344798e6529c71cfe6033a52ddb5fd

    • SHA256

      793f21c64be578414f8f58ce69c3705b2d4dbd1ee3c291ad0ef26dc7ad959599

    • SHA512

      f1266c41a27a7d54043ebd9014c9da7ce44a68cccab94883f4f8f51078b00f7dbc00147b404c977390c7856df1c53d23d438564c257ab37135fef154cf010beb

    • SSDEEP

      3072:R0TGuenFBt2k2+ceJCK49glnt2b4LHXm70alQ/mRoOorL:R0TbenfwkqKvntZLHWn6mKOof

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks