General

  • Target

    de386945fc3ca309c4c0527d5907b455

  • Size

    69KB

  • Sample

    240325-rqapesde6y

  • MD5

    de386945fc3ca309c4c0527d5907b455

  • SHA1

    6551e15ec9a8c50869d5d36a40b0f8f33a0f4d38

  • SHA256

    498041a767c5aea479de246cede5c8bd28ddac21a6b3b988f4271981c7e11378

  • SHA512

    487c9c0d9634390d84c8a067af2efe50f9c9cef31f11d2dad234f1bee6e03963cf7ce575574d09f0ab7ba8153de99e88bad11cddb51379dbd74d2569754a8cb1

  • SSDEEP

    768:4WgOI+15tK7ramNSiYCFZA2H6KI2ek3Ub86Q1lYTQWa6tDgVoS:kOlG75SAFZzaKI7M1lCdhDgZ

Score
7/10

Malware Config

Targets

    • Target

      de386945fc3ca309c4c0527d5907b455

    • Size

      69KB

    • MD5

      de386945fc3ca309c4c0527d5907b455

    • SHA1

      6551e15ec9a8c50869d5d36a40b0f8f33a0f4d38

    • SHA256

      498041a767c5aea479de246cede5c8bd28ddac21a6b3b988f4271981c7e11378

    • SHA512

      487c9c0d9634390d84c8a067af2efe50f9c9cef31f11d2dad234f1bee6e03963cf7ce575574d09f0ab7ba8153de99e88bad11cddb51379dbd74d2569754a8cb1

    • SSDEEP

      768:4WgOI+15tK7ramNSiYCFZA2H6KI2ek3Ub86Q1lYTQWa6tDgVoS:kOlG75SAFZzaKI7M1lCdhDgZ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks