General

  • Target

    4a7ee670997896ba83ca512d63ed3bf0N

  • Size

    76KB

  • Sample

    240908-1hz4saygnh

  • MD5

    4a7ee670997896ba83ca512d63ed3bf0

  • SHA1

    9bc17034ff3f461843a0e0b39384060e80c82e79

  • SHA256

    01360595c553bee64fddae25f7f0c58ee42bfc3548c357242057eff394f6ec2b

  • SHA512

    cd1695fc9d6e26bc366835ce1bc05a06c78d96ac1c286a88829f63c8ef1eb2127501b1679294624bdf16dbbc480d71edc1942b8d254993be68a5a40aa3801b12

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZAm/C:c8y93KQjy7G55riF1cMo03Gmq

Malware Config

Targets

    • Target

      4a7ee670997896ba83ca512d63ed3bf0N

    • Size

      76KB

    • MD5

      4a7ee670997896ba83ca512d63ed3bf0

    • SHA1

      9bc17034ff3f461843a0e0b39384060e80c82e79

    • SHA256

      01360595c553bee64fddae25f7f0c58ee42bfc3548c357242057eff394f6ec2b

    • SHA512

      cd1695fc9d6e26bc366835ce1bc05a06c78d96ac1c286a88829f63c8ef1eb2127501b1679294624bdf16dbbc480d71edc1942b8d254993be68a5a40aa3801b12

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZAm/C:c8y93KQjy7G55riF1cMo03Gmq

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks