General

  • Target

    d7a1f27c239a90f7d8369d8133d54e99

  • Size

    28KB

  • Sample

    240320-ckwmdaeh2y

  • MD5

    d7a1f27c239a90f7d8369d8133d54e99

  • SHA1

    f94440a881ff50f9d1f8ac09c685e56e61b82709

  • SHA256

    09947312ea46a938f5126751fd070c1b3774ddfaede9fca23b3575a4dd7ee0e3

  • SHA512

    0ed68a854a5cccfc3408f332f9c7f4163c413588596fe32b7df583faca34c7623163927136579e236d049592e3379ad3a89fba8962b74963118541718ebc9c4d

  • SSDEEP

    768:jkJNAGFFg2OOeL+cofLZ/XHfm1oD+fW69WLKOBId/D7V:jkJNAMFgll+DfL1e1O+ubLd4HV

Score
7/10
upx

Malware Config

Targets

    • Target

      d7a1f27c239a90f7d8369d8133d54e99

    • Size

      28KB

    • MD5

      d7a1f27c239a90f7d8369d8133d54e99

    • SHA1

      f94440a881ff50f9d1f8ac09c685e56e61b82709

    • SHA256

      09947312ea46a938f5126751fd070c1b3774ddfaede9fca23b3575a4dd7ee0e3

    • SHA512

      0ed68a854a5cccfc3408f332f9c7f4163c413588596fe32b7df583faca34c7623163927136579e236d049592e3379ad3a89fba8962b74963118541718ebc9c4d

    • SSDEEP

      768:jkJNAGFFg2OOeL+cofLZ/XHfm1oD+fW69WLKOBId/D7V:jkJNAMFgll+DfL1e1O+ubLd4HV

    Score
    7/10
    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks