General

  • Target

    d623eb8c5e903b686640520b4fc875c9

  • Size

    13KB

  • Sample

    240319-pwd8pada9y

  • MD5

    d623eb8c5e903b686640520b4fc875c9

  • SHA1

    5fe3d6cbfa4cc4b829338416672a64ab6084b98e

  • SHA256

    d2d8182f10614eca1b408614c5f6bfdf0fd4dd9afe8f6629b4df6619b443710d

  • SHA512

    a16c9620c400f909bd8741057720eab0db96ce4df4bbb734ab9b425b3bdc6c81d07916f972a02900617ae1a3bb69f0e500ca2dc90f35092a362335a605a253ee

  • SSDEEP

    384:cURsec4iMkbV0Hmo73lRbc9CgoAIOEwF7ftUbt7U+:cyfc4iM2VSmsw8Z+ftY

Score
8/10

Malware Config

Targets

    • Target

      d623eb8c5e903b686640520b4fc875c9

    • Size

      13KB

    • MD5

      d623eb8c5e903b686640520b4fc875c9

    • SHA1

      5fe3d6cbfa4cc4b829338416672a64ab6084b98e

    • SHA256

      d2d8182f10614eca1b408614c5f6bfdf0fd4dd9afe8f6629b4df6619b443710d

    • SHA512

      a16c9620c400f909bd8741057720eab0db96ce4df4bbb734ab9b425b3bdc6c81d07916f972a02900617ae1a3bb69f0e500ca2dc90f35092a362335a605a253ee

    • SSDEEP

      384:cURsec4iMkbV0Hmo73lRbc9CgoAIOEwF7ftUbt7U+:cyfc4iM2VSmsw8Z+ftY

    Score
    8/10
    • Modifies AppInit DLL entries

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks