General

  • Target

    test.b

  • Size

    68KB

  • Sample

    240415-vggm6ade9z

  • MD5

    76fe4be4c48fe6a25c6521caf68a7b23

  • SHA1

    d8fa16e99157c41864e263a64b64f075fa3278b9

  • SHA256

    5d1fc8420f510d61d29d61e2b1823b47685405db7aed689fa6b8387a276138fa

  • SHA512

    81932dc932be90d86f1b21191e4a6cb21f77bfa3f69ee7f053e59a92c5aa5f9bcea8e65a59bea44df405c4b1207640885a9a828503865b4e135fe60ed8c2852c

  • SSDEEP

    1536:FijP5RqEe40F87eiMMnhKnZgQE1NQb5P0mv6:FsG/MhKnlVt/v

Score
9/10

Malware Config

Targets

    • Target

      test.b

    • Size

      68KB

    • MD5

      76fe4be4c48fe6a25c6521caf68a7b23

    • SHA1

      d8fa16e99157c41864e263a64b64f075fa3278b9

    • SHA256

      5d1fc8420f510d61d29d61e2b1823b47685405db7aed689fa6b8387a276138fa

    • SHA512

      81932dc932be90d86f1b21191e4a6cb21f77bfa3f69ee7f053e59a92c5aa5f9bcea8e65a59bea44df405c4b1207640885a9a828503865b4e135fe60ed8c2852c

    • SSDEEP

      1536:FijP5RqEe40F87eiMMnhKnZgQE1NQb5P0mv6:FsG/MhKnlVt/v

    Score
    9/10
    • Contacts a large (24839) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks