General

  • Target

    42c7bd1fa6cd872dcddfee0223c58720N.exe

  • Size

    76KB

  • Sample

    240818-ny346asejf

  • MD5

    42c7bd1fa6cd872dcddfee0223c58720

  • SHA1

    7671f71fbd8d94fa6f80fb71f26004dd8eaad1fb

  • SHA256

    bb43ab4efdc568377e8c21af005fadecdbdfea7a35cffc2a868a20b4349612aa

  • SHA512

    119175b3af24577d56a8b4064882242287078e5e708f3f372302a07bba9a5bab06f1f6ce8fd7d8fadb2822e6b2c60f0d84acc603aa71ed73836c93270a01c7f6

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZaGrRF:c8y93KQjy7G55riF1cMo03bF

Malware Config

Targets

    • Target

      42c7bd1fa6cd872dcddfee0223c58720N.exe

    • Size

      76KB

    • MD5

      42c7bd1fa6cd872dcddfee0223c58720

    • SHA1

      7671f71fbd8d94fa6f80fb71f26004dd8eaad1fb

    • SHA256

      bb43ab4efdc568377e8c21af005fadecdbdfea7a35cffc2a868a20b4349612aa

    • SHA512

      119175b3af24577d56a8b4064882242287078e5e708f3f372302a07bba9a5bab06f1f6ce8fd7d8fadb2822e6b2c60f0d84acc603aa71ed73836c93270a01c7f6

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZaGrRF:c8y93KQjy7G55riF1cMo03bF

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks