General

  • Target

    c230c6d7369b02b883a68255eff877e4

  • Size

    23KB

  • Sample

    240312-cljdfadb5t

  • MD5

    c230c6d7369b02b883a68255eff877e4

  • SHA1

    e4a1e5ab565fbdc6434f4117c85b93837de2db0e

  • SHA256

    82b7bba4a8d2b8567f5d24a877185851a464567367d5158a2144618a93b8fa18

  • SHA512

    1de624a5f16c62958bf01f14fbaa74ec3da274caf27c662022f16677ccf27fe2b3479468c53396b6d137afcff77a6c62c45a83fdd83f1ac94a79c7a6ce272dd2

  • SSDEEP

    384:k9VdkKlw3qCNhVLsfDNqfId3tgzt+WFwxnLNiGHsj9dZDXuVWYrmbtuAQK:k9VdcqCNhm/yB+WFwpwGMxLXuVWYSbtQ

Score
7/10
upx

Malware Config

Targets

    • Target

      c230c6d7369b02b883a68255eff877e4

    • Size

      23KB

    • MD5

      c230c6d7369b02b883a68255eff877e4

    • SHA1

      e4a1e5ab565fbdc6434f4117c85b93837de2db0e

    • SHA256

      82b7bba4a8d2b8567f5d24a877185851a464567367d5158a2144618a93b8fa18

    • SHA512

      1de624a5f16c62958bf01f14fbaa74ec3da274caf27c662022f16677ccf27fe2b3479468c53396b6d137afcff77a6c62c45a83fdd83f1ac94a79c7a6ce272dd2

    • SSDEEP

      384:k9VdkKlw3qCNhVLsfDNqfId3tgzt+WFwxnLNiGHsj9dZDXuVWYrmbtuAQK:k9VdcqCNhm/yB+WFwpwGMxLXuVWYSbtQ

    Score
    7/10
    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks