General

  • Target

    40e960d2f647ad444789b916e0b3e030N.exe

  • Size

    76KB

  • Sample

    240719-c29wbsyelm

  • MD5

    40e960d2f647ad444789b916e0b3e030

  • SHA1

    94e829324318f9c63bfebad04e98f070034ad4d5

  • SHA256

    4cd06f7d52d3dfce49075de3760752fd13a252fa2e7e3df17500eac59ca93aea

  • SHA512

    29b31ae9aafd86ffe16f19036bd6e915a1ea6ca8bc4beb467cd60eff437bbe6696a3f2afd41560636b9aad18e8f7dd6f2193374e0912c7f28e9de59af3a03d48

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZTk:c8y93KQjy7G55riF1cMo03xk

Malware Config

Targets

    • Target

      40e960d2f647ad444789b916e0b3e030N.exe

    • Size

      76KB

    • MD5

      40e960d2f647ad444789b916e0b3e030

    • SHA1

      94e829324318f9c63bfebad04e98f070034ad4d5

    • SHA256

      4cd06f7d52d3dfce49075de3760752fd13a252fa2e7e3df17500eac59ca93aea

    • SHA512

      29b31ae9aafd86ffe16f19036bd6e915a1ea6ca8bc4beb467cd60eff437bbe6696a3f2afd41560636b9aad18e8f7dd6f2193374e0912c7f28e9de59af3a03d48

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZTk:c8y93KQjy7G55riF1cMo03xk

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks