General

  • Target

    470e11682abb522051bfe838db8c2f239ab4efca23c8c5956cedb3282e12f94e.exe.compressed

  • Size

    160KB

  • Sample

    240128-2z7evsccd6

  • MD5

    783bfc4ed097aa2d936b96478e92edca

  • SHA1

    85e267feb6ad0d0597717cafefd9016d52aa6a58

  • SHA256

    2309ffb7ca99f97a45d65f5e1ee15775021b5091c38431d5313d19828865a26e

  • SHA512

    8b73cd79d0f9d8ae0102f1f1ddc6f97738212f97627503160d3e09743b9cfd7ac5e90f9da94dd0ce1961da12e0702518fadb0c39f6984cbfcef41e8acafcb0fe

  • SSDEEP

    3072:0FB3O3IRORghwODMJlz1dxoOXwupfbvsS4LA4BUAvbi3pOwjwzzy:SBZcIDqvysbpftUA4bWgwee

Score
10/10

Malware Config

Targets

    • Target

      470e11682abb522051bfe838db8c2f239ab4efca23c8c5956cedb3282e12f94e.exe.compressed

    • Size

      160KB

    • MD5

      783bfc4ed097aa2d936b96478e92edca

    • SHA1

      85e267feb6ad0d0597717cafefd9016d52aa6a58

    • SHA256

      2309ffb7ca99f97a45d65f5e1ee15775021b5091c38431d5313d19828865a26e

    • SHA512

      8b73cd79d0f9d8ae0102f1f1ddc6f97738212f97627503160d3e09743b9cfd7ac5e90f9da94dd0ce1961da12e0702518fadb0c39f6984cbfcef41e8acafcb0fe

    • SSDEEP

      3072:0FB3O3IRORghwODMJlz1dxoOXwupfbvsS4LA4BUAvbi3pOwjwzzy:SBZcIDqvysbpftUA4bWgwee

    Score
    9/10
    • Detects command variations typically used by ransomware

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks