General

  • Target

    addf65a9c174d3ebfc6b4262ccdcb756

  • Size

    413KB

  • Sample

    240229-gxzl1sgg66

  • MD5

    addf65a9c174d3ebfc6b4262ccdcb756

  • SHA1

    cf5e46b2c21a1021b98c9210cb2603981a71958b

  • SHA256

    8ec0a6843ca8e65a46d5157e3e77e7dc969fd65022eb27579306df5d2b3cc2ab

  • SHA512

    3acbe29aa4a30689e2323e746dbfcea1141364766288ccae1f16be424b88fad4ea06906ec39b0c444c9ed864bebd021cee4949f6d9230c5134f1e1a602a0ae92

  • SSDEEP

    12288:bL7eW9QxIskx8Myo6Pc/FKUpD2EjcN/9qW1:buW9Rs3cMtgcZcK

Score
7/10
upx

Malware Config

Targets

    • Target

      kinguard.dll

    • Size

      36KB

    • MD5

      caf6a600e9e924df1671a6a0e83c1d77

    • SHA1

      dfd4aebe500dc662a64d59765d7444ced474fafe

    • SHA256

      4d1cc60e8325b3ec0289afe2f909bf41ead5a351d9064b2b90f198a6946426da

    • SHA512

      308ff9261584e67a0406b77dc6142e5fed9dc830dc3d3824666296cbd6fbc5cd818c7615a5a18797b9ba86c9a8c70ed87d5bc981a1fa2c995ff863600ee471c9

    • SSDEEP

      384:87mQLpmRUMITGawVBWaIvcujcwg2TJoGXnFi3:87mQ0tcBjcb2FznF

    Score
    1/10
    • Target

      新云软件.url

    • Size

      133B

    • MD5

      4f0017b3b346bd0626f0c3b915e6e734

    • SHA1

      823bf3ff9e16cd636c9dc0dc690d6a586fcbfe92

    • SHA256

      df65af1fc1e09f6effbde7e0ef1cb64d6caeef1f62b0e6467821efa032533678

    • SHA512

      0f5eb5024cf6a0323f7998d419995a707c48de917a5899a185369e6acfeb17c09ffa03f7d110adc87b8de20b7d4bf30d50c72479bfb18614d2e21cbe169dc5a6

    Score
    1/10
    • Target

      显示器软开关.exe

    • Size

      568KB

    • MD5

      f29c6cffa4512d6978cbf497e2a6d1d8

    • SHA1

      9fe973d896c48b80f0faad4962cdf349355cf680

    • SHA256

      cc696cd584e06b448eb1c43ca3fac0b6db2a95f4f7b7f20891c3d9809d73388c

    • SHA512

      d1f8241b8cf5cc3f9f505aa484a8886c881b9ba74c615e3f680b9643678d7961bc353936f5549aac28aa4a37af533b3d8871b7f32d7f683809ac92940a5f0273

    • SSDEEP

      12288:oHlp8gUiSTF7nbINtM6XPod9dbat0biNXZQdQrk8u7O:oHTHUiSZ7nb2tMIPfHXZE8

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks