General

  • Target

    ca9e8f57278e2da7efff26b4372b26f0N

  • Size

    746KB

  • Sample

    240907-vlyggavbjq

  • MD5

    ca9e8f57278e2da7efff26b4372b26f0

  • SHA1

    58fc11dee79c699e7ba4a73d1f027be970c6f6c1

  • SHA256

    a2c226733560d92c46d6a02f26835d36a414294a1a057a3225001d7776fabc62

  • SHA512

    0a048521159c29b2068599f79372577c8e35ccb1dffd118917de80f64539265100046a5dcd530642958fa5977f796556aa50c71de5206446d5cfdac329539867

  • SSDEEP

    12288:7tKe6Zv23YLVFhBsC8iFHs+hsuQXIQRUP/g8t5/bIwY6rpXU5neWw:v6Zv2ivhBVnFvh5Q44UP48ncwdhknk

Malware Config

Targets

    • Target

      ca9e8f57278e2da7efff26b4372b26f0N

    • Size

      746KB

    • MD5

      ca9e8f57278e2da7efff26b4372b26f0

    • SHA1

      58fc11dee79c699e7ba4a73d1f027be970c6f6c1

    • SHA256

      a2c226733560d92c46d6a02f26835d36a414294a1a057a3225001d7776fabc62

    • SHA512

      0a048521159c29b2068599f79372577c8e35ccb1dffd118917de80f64539265100046a5dcd530642958fa5977f796556aa50c71de5206446d5cfdac329539867

    • SSDEEP

      12288:7tKe6Zv23YLVFhBsC8iFHs+hsuQXIQRUP/g8t5/bIwY6rpXU5neWw:v6Zv2ivhBVnFvh5Q44UP48ncwdhknk

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks