General

  • Target

    23fa4286ebd1ab5f89e5052692b3d4b0N.exe

  • Size

    501KB

  • Sample

    240821-1w2jrssgpa

  • MD5

    23fa4286ebd1ab5f89e5052692b3d4b0

  • SHA1

    11d8684e778d53dd8db97c9029c7db097b9e4771

  • SHA256

    add21e05e98604929038b131b2d0be3d5ca3e1463d7e81589b27828e6b2f509b

  • SHA512

    c88e60d1eae82c6e180213270b1dbba9a545a1318f9796bea797a5f2f7da64151ce0effad709d35021122bba4011677ed115ab2d0f5e7eed4a1c4bfff95be365

  • SSDEEP

    12288:0UKMeQiwQSwCfodYgMD/G3hu/Gg5p+ou/Tco7u4Li:0Uw1wQSwCGE/I8b+LI2

Score
7/10

Malware Config

Targets

    • Target

      23fa4286ebd1ab5f89e5052692b3d4b0N.exe

    • Size

      501KB

    • MD5

      23fa4286ebd1ab5f89e5052692b3d4b0

    • SHA1

      11d8684e778d53dd8db97c9029c7db097b9e4771

    • SHA256

      add21e05e98604929038b131b2d0be3d5ca3e1463d7e81589b27828e6b2f509b

    • SHA512

      c88e60d1eae82c6e180213270b1dbba9a545a1318f9796bea797a5f2f7da64151ce0effad709d35021122bba4011677ed115ab2d0f5e7eed4a1c4bfff95be365

    • SSDEEP

      12288:0UKMeQiwQSwCfodYgMD/G3hu/Gg5p+ou/Tco7u4Li:0Uw1wQSwCGE/I8b+LI2

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks