General

  • Target

    echo.7z

  • Size

    11.4MB

  • Sample

    240521-s61q8aag52

  • MD5

    4818accedc08bbb6f350a96a7dc11871

  • SHA1

    96b90dd9099b689127c5c965eb1518acbef9bf9e

  • SHA256

    a00dc4b646318db993937ca9006bf9bcd361947ce53946b8b308c14c06c2bbe9

  • SHA512

    19548b09f6b58cbc2913eb35187dacb8b216f057fcd2359a06a98d73a2fd4f9d3b64a8b6cc6cc24f8fe5f22b0c32c93def611882f723a8db4043e044105cb285

  • SSDEEP

    196608:3U6ke4SKN+wM9xEA1uA3eCnyBNSz6vBaVXBqK4s0/lrCpFrhGM4kuSb0n:3ULecNJKTyBNoQKwKhGM4/D

Score
7/10

Malware Config

Targets

    • Target

      echo.7z

    • Size

      11.4MB

    • MD5

      4818accedc08bbb6f350a96a7dc11871

    • SHA1

      96b90dd9099b689127c5c965eb1518acbef9bf9e

    • SHA256

      a00dc4b646318db993937ca9006bf9bcd361947ce53946b8b308c14c06c2bbe9

    • SHA512

      19548b09f6b58cbc2913eb35187dacb8b216f057fcd2359a06a98d73a2fd4f9d3b64a8b6cc6cc24f8fe5f22b0c32c93def611882f723a8db4043e044105cb285

    • SSDEEP

      196608:3U6ke4SKN+wM9xEA1uA3eCnyBNSz6vBaVXBqK4s0/lrCpFrhGM4kuSb0n:3ULecNJKTyBNoQKwKhGM4/D

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks