General

  • Target

    00c2f666002942709f70e4ff9f84a730N.exe

  • Size

    76KB

  • Sample

    240817-l8jgdstblp

  • MD5

    00c2f666002942709f70e4ff9f84a730

  • SHA1

    020ea3a3465ada0c5bb4d66593a2ba9cbbe8888e

  • SHA256

    476d498e843f5aecb68402e576cd3ca56d21d10110f006ed8177584592257e15

  • SHA512

    554b81e2c0f462f318a2209be8dc1de3bda48693a77eb90c0703a6cf943f47346b23930079f01497b61e6deb8422069b4b7db27cf4579e76a33486b96770aa48

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zw1:c8y93KQjy7G55riF1cMo03y1

Malware Config

Targets

    • Target

      00c2f666002942709f70e4ff9f84a730N.exe

    • Size

      76KB

    • MD5

      00c2f666002942709f70e4ff9f84a730

    • SHA1

      020ea3a3465ada0c5bb4d66593a2ba9cbbe8888e

    • SHA256

      476d498e843f5aecb68402e576cd3ca56d21d10110f006ed8177584592257e15

    • SHA512

      554b81e2c0f462f318a2209be8dc1de3bda48693a77eb90c0703a6cf943f47346b23930079f01497b61e6deb8422069b4b7db27cf4579e76a33486b96770aa48

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zw1:c8y93KQjy7G55riF1cMo03y1

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks