General

  • Target

    19a620cf7b83b832798645afddb34f70N.exe

  • Size

    76KB

  • Sample

    240721-1y2ybaxaph

  • MD5

    19a620cf7b83b832798645afddb34f70

  • SHA1

    8475b08ecb17d440d880f8b04bc96ac3bbf3f3d1

  • SHA256

    29a1fec8349e4afd99da15561ff1cf755780a74a7b313551e7218cb160e3a225

  • SHA512

    1bef2292b557d43099980da4553ae241cb7d1172b703a6757998ffda593b298091b250f52bec9913b1fab668f474c8ed0e4a4008d3c83743bf29aacb1ac4ceac

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZsUl:c8y93KQjy7G55riF1cMo03Tl

Malware Config

Targets

    • Target

      19a620cf7b83b832798645afddb34f70N.exe

    • Size

      76KB

    • MD5

      19a620cf7b83b832798645afddb34f70

    • SHA1

      8475b08ecb17d440d880f8b04bc96ac3bbf3f3d1

    • SHA256

      29a1fec8349e4afd99da15561ff1cf755780a74a7b313551e7218cb160e3a225

    • SHA512

      1bef2292b557d43099980da4553ae241cb7d1172b703a6757998ffda593b298091b250f52bec9913b1fab668f474c8ed0e4a4008d3c83743bf29aacb1ac4ceac

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZsUl:c8y93KQjy7G55riF1cMo03Tl

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks