General

  • Target

    CodenameEngine.exe

  • Size

    72.0MB

  • Sample

    240204-q5976adddp

  • MD5

    9207961c1d4c7da67b320f30720959ec

  • SHA1

    1be2588015a13459dbb0a4269de661fb2c91d189

  • SHA256

    f96cdb660ad3e73061612b0e20a5ae55150a099f06ebd330e50c70e22873d469

  • SHA512

    9c4cb67f2743f84fa9744c63ff980772e3d7815bcd1eddb74b46c025c3446f72e5b6e89ae003a655241d3105f158dda9114d9aa1fd83fd37a7d73500f82bd197

  • SSDEEP

    393216:etX5mD4MnaIGlQS5lqyUXAIV2Yrsz2Y1Ltfl3jFQq7cUH9Xfv7kpt/xLATFD5zpp:eaHXLzrszrY4zpy+

Score
6/10

Malware Config

Targets

    • Target

      CodenameEngine.exe

    • Size

      72.0MB

    • MD5

      9207961c1d4c7da67b320f30720959ec

    • SHA1

      1be2588015a13459dbb0a4269de661fb2c91d189

    • SHA256

      f96cdb660ad3e73061612b0e20a5ae55150a099f06ebd330e50c70e22873d469

    • SHA512

      9c4cb67f2743f84fa9744c63ff980772e3d7815bcd1eddb74b46c025c3446f72e5b6e89ae003a655241d3105f158dda9114d9aa1fd83fd37a7d73500f82bd197

    • SSDEEP

      393216:etX5mD4MnaIGlQS5lqyUXAIV2Yrsz2Y1Ltfl3jFQq7cUH9Xfv7kpt/xLATFD5zpp:eaHXLzrszrY4zpy+

    Score
    6/10
    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks