General

  • Target

    Install.exe

  • Size

    162KB

  • Sample

    240720-meplzsxgkn

  • MD5

    1f78e6c795dd5a5f174363bb791706a2

  • SHA1

    80924b5502190d916ac762425dade5e7143d7377

  • SHA256

    08c51db49a008bed57f54a6370e8df0f00994acf066647c8986232bf07b3d5ec

  • SHA512

    d6b1afd0489c489aad516cc83466198521cd6e9ff670d6aa76bf274f01de6b25959d495c6286718961f78517ba6d6bcd335777ecd4e8cfe33a4f04f59ab83e87

  • SSDEEP

    3072:cQps/fyjjeCg4fuJaoyXekMt/q1lau7qt5a7v+kDh4tufgLgpMj:cQps/fyjjegfuR+t1kuet5GlELgpW

Score
10/10

Malware Config

Targets

    • Target

      Install.exe

    • Size

      162KB

    • MD5

      1f78e6c795dd5a5f174363bb791706a2

    • SHA1

      80924b5502190d916ac762425dade5e7143d7377

    • SHA256

      08c51db49a008bed57f54a6370e8df0f00994acf066647c8986232bf07b3d5ec

    • SHA512

      d6b1afd0489c489aad516cc83466198521cd6e9ff670d6aa76bf274f01de6b25959d495c6286718961f78517ba6d6bcd335777ecd4e8cfe33a4f04f59ab83e87

    • SSDEEP

      3072:cQps/fyjjeCg4fuJaoyXekMt/q1lau7qt5a7v+kDh4tufgLgpMj:cQps/fyjjegfuR+t1kuet5GlELgpW

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks