General

  • Target

    7a57a6d9bac6be7f0462fd4b9c7e5e31

  • Size

    37KB

  • Sample

    240127-qfqgfsefcl

  • MD5

    7a57a6d9bac6be7f0462fd4b9c7e5e31

  • SHA1

    b4b7ec5fa19aed61342244c1b598ad09a8254076

  • SHA256

    b162ee6b1a26633ef8eb61125f1de5556983fc17dc196655458815a16d4e805d

  • SHA512

    09472ffbe78f3ea9d29540f1983fa02031b48829bbcc057d5ba9e8dc7a2e818740d7d9ccd2df44e1623a133952ea4322b70b9bb024f160ee14ee354112bfb675

  • SSDEEP

    768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrj:j0Rbb5WRQYt9ir/2wraI

Score
7/10

Malware Config

Targets

    • Target

      7a57a6d9bac6be7f0462fd4b9c7e5e31

    • Size

      37KB

    • MD5

      7a57a6d9bac6be7f0462fd4b9c7e5e31

    • SHA1

      b4b7ec5fa19aed61342244c1b598ad09a8254076

    • SHA256

      b162ee6b1a26633ef8eb61125f1de5556983fc17dc196655458815a16d4e805d

    • SHA512

      09472ffbe78f3ea9d29540f1983fa02031b48829bbcc057d5ba9e8dc7a2e818740d7d9ccd2df44e1623a133952ea4322b70b9bb024f160ee14ee354112bfb675

    • SSDEEP

      768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrj:j0Rbb5WRQYt9ir/2wraI

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks