Resubmissions

26/04/2024, 07:14

240426-h2zm9abd4t 10

26/04/2024, 07:14

240426-h2zcgsbe36 8

26/04/2024, 07:14

240426-h2yqysbe35 10

26/04/2024, 07:14

240426-h2ye7abe34 8

26/04/2024, 07:14

240426-h2xtnabd31 7

25/04/2024, 13:11

240425-qe4yfsbb27 8

General

  • Target

    af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e

  • Size

    2.0MB

  • Sample

    240426-h2ye7abe34

  • MD5

    3eb4e7d99afa9e61d5fbcd4c42985220

  • SHA1

    a67ca6138a9f0cfc70c3406c39e88b88567ff76b

  • SHA256

    af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e

  • SHA512

    d704a96c7a32e713772497880d05f83fd5c6ef28f3a3e4da4b2de2dbaebf0505bdbd302b41aca3a326f10c8493101bc4b65fb073233c472c75d541bbceb9aff6

  • SSDEEP

    49152:fBKsEZMOc1XTmPFoTqoSsFpoBVFSc00byphfNs4MexOH3k/9:fBtscWoSsFpoBVFSctSNSecH

Malware Config

Targets

    • Target

      af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e

    • Size

      2.0MB

    • MD5

      3eb4e7d99afa9e61d5fbcd4c42985220

    • SHA1

      a67ca6138a9f0cfc70c3406c39e88b88567ff76b

    • SHA256

      af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e

    • SHA512

      d704a96c7a32e713772497880d05f83fd5c6ef28f3a3e4da4b2de2dbaebf0505bdbd302b41aca3a326f10c8493101bc4b65fb073233c472c75d541bbceb9aff6

    • SSDEEP

      49152:fBKsEZMOc1XTmPFoTqoSsFpoBVFSc00byphfNs4MexOH3k/9:fBtscWoSsFpoBVFSctSNSecH

    • Contacts a large (765) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks