General

  • Target

    f4d4047bc3aa44cceed0ade66340e110N.exe

  • Size

    76KB

  • Sample

    240824-he2jbsxgjf

  • MD5

    f4d4047bc3aa44cceed0ade66340e110

  • SHA1

    9a410fcd0e2e59c9afc3e37fb799a542659bf8c6

  • SHA256

    7aeedbc4057e7289bb185bf28f6a84ea51853e7d1d658feaafef4578e732c6ee

  • SHA512

    83228781f721197a70aeb0d13b689f30a0344464d75aa16153b774bddf822de51555cb6e5775e2755f8bbe0df67ebd713927258923c4fe79e969a7d3766e2262

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZzYmSrO:c8y93KQjy7G55riF1cMo031Ymx

Malware Config

Targets

    • Target

      f4d4047bc3aa44cceed0ade66340e110N.exe

    • Size

      76KB

    • MD5

      f4d4047bc3aa44cceed0ade66340e110

    • SHA1

      9a410fcd0e2e59c9afc3e37fb799a542659bf8c6

    • SHA256

      7aeedbc4057e7289bb185bf28f6a84ea51853e7d1d658feaafef4578e732c6ee

    • SHA512

      83228781f721197a70aeb0d13b689f30a0344464d75aa16153b774bddf822de51555cb6e5775e2755f8bbe0df67ebd713927258923c4fe79e969a7d3766e2262

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZzYmSrO:c8y93KQjy7G55riF1cMo031Ymx

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks