General

  • Target

    temp_data.rar

  • Size

    17.4MB

  • Sample

    240824-t5dqqs1cqp

  • MD5

    d7921f94494dd9213390699535de3e6f

  • SHA1

    c7e5e8dfdcbe71acbdf5996759f49ce0e42f80a3

  • SHA256

    5f9ab323ea63d90774804713dd2f85907ce99c0a8cbab40d52c3cb0dc431c201

  • SHA512

    4eb70518d7e78611167737c0939b114236cb193f2e0c32dff71f839f544f8708e5440cae5866c4dc8c908d90ab1f8bb6159e7ed766d5c17eef903bfaf0266906

  • SSDEEP

    393216:FPTaL6zRHjS7yiw2ahMqycz1oUwYqyMSM0wz46WRthcSRUbQs:FPG2FjS7bw2lqyc5jEyMSM0wUFRDtgv

Score
7/10

Malware Config

Targets

    • Target

      2555superiority.dll

    • Size

      2.9MB

    • MD5

      88e03e21ef24b687e09ff9b99edb1ed8

    • SHA1

      3157b62c5d2e23735fde4ed59748bd549b498e18

    • SHA256

      856265d0d04d67dce09d0046806d41b11dd74ab5336d359ed6fbccb7bfd72e5c

    • SHA512

      e12356886ff19e6cb01287f10f3e2154a6ba05ba566de02eb62d803c417c1b344abb37e05f0a3fc2b2f7602c49a4456abb6014f716b5018d1a863f61f5fdc460

    • SSDEEP

      49152:EKXLDMhW01Um5dUUm80QbaqLxF9guV4nQ5ERj9mlWeiYtnERyuiCk:rXq2D4F9k9e/

    Score
    5/10
    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      eacbypass.exe

    • Size

      17.0MB

    • MD5

      b0b621a3e61a8e3f86368425ab6c6d17

    • SHA1

      ceb3762cb1ada2f2cec48ad73c0b7d27ce1bc863

    • SHA256

      48526989c4dc457e5efb621c882893f4dfb770b7c6c2516ffa85d2abb43a1d66

    • SHA512

      93c6331a4119f484fab790d1cf29822ab05d2889771eff921029aa8dbf67518b7450969fae6b25daca6b6e3368a159b89d68cc245653a703b25fa0b4323ec43a

    • SSDEEP

      393216:Ezl82HAcXwF0L1+TtIiFg0VmRW8E5u6bGpV3g5bLYj5fF:sjDwF0L1QtI6mRW8IuxV3Mg3

    Score
    7/10
    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks