General

  • Target

    8631c4bf2f86f0c7f6aacd5ee9720d70

  • Size

    363KB

  • Sample

    240201-hc4kxadcg2

  • MD5

    8631c4bf2f86f0c7f6aacd5ee9720d70

  • SHA1

    fbf422cb6832ee7973900d9452e7efffaa37792c

  • SHA256

    55615de80f5c8c8ea9b34d5a867ac74852594a0f3802e8b5c4d88061263817ca

  • SHA512

    b82c72f7fef8203ea569e12c5293d6d05706cd5ded80611c704cc0087f0f3ffe63566fa4ee277098d3efba74c13b43b639add0611e7172c76fa952739d271cac

  • SSDEEP

    6144:7Qq+qilUKQWwsctuEDBHlC8w9WuKc9mfhTNSBLJeQAT+u:7/+5lJvwVdNdeuphkBNRq+u

Score
7/10

Malware Config

Targets

    • Target

      8631c4bf2f86f0c7f6aacd5ee9720d70

    • Size

      363KB

    • MD5

      8631c4bf2f86f0c7f6aacd5ee9720d70

    • SHA1

      fbf422cb6832ee7973900d9452e7efffaa37792c

    • SHA256

      55615de80f5c8c8ea9b34d5a867ac74852594a0f3802e8b5c4d88061263817ca

    • SHA512

      b82c72f7fef8203ea569e12c5293d6d05706cd5ded80611c704cc0087f0f3ffe63566fa4ee277098d3efba74c13b43b639add0611e7172c76fa952739d271cac

    • SSDEEP

      6144:7Qq+qilUKQWwsctuEDBHlC8w9WuKc9mfhTNSBLJeQAT+u:7/+5lJvwVdNdeuphkBNRq+u

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks