General

  • Target

    0d218b4057f242226ab97af92b57da0d.bin

  • Size

    686KB

  • Sample

    240909-bcy7vswgjg

  • MD5

    7f1222ae5b87fbcb41e09b3111be8789

  • SHA1

    fe03a90ee49a96586b1cd4d1d687a629bc02a1ea

  • SHA256

    8f446c74411a96f79fa885e6551697cdb6ff19369e9399360a0b6b70488511d1

  • SHA512

    0a619f4e6be40e88fbd64f902d48d1d3aa7f6aa5eb7d9488296fb91cbae1b8fb3b2cd59fbd1cce8d38cde4163d794c55f504c6af17e261e895e621946b399ca9

  • SSDEEP

    12288:TzzKldS0MctSp1E4LBUvfqvCwHXfW4v45ql73zXmiXNGyaWYai6cI+wMG:T/sS0j0p17+vSKwHb4wFbmidGyaWYa8y

Score
7/10

Malware Config

Targets

    • Target

      AUG 2024 SOA.exe

    • Size

      712KB

    • MD5

      c798a0526218a02b39a5789aac0f8802

    • SHA1

      d23e9b5eb48d192a8494b225472478d820e7083d

    • SHA256

      3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64

    • SHA512

      beae93075c02917b483523e240727b91c640e4e23291b61cd11d1cb283762ab90784f09a53a1e842facba064f7ef60cf9eeb01085f8156e6963169c747805d52

    • SSDEEP

      12288:sYV6MorX7qzuC3QHO9FQVHPF51jgc6B+gwiK3fw3uZhWOkVdRcTkXfmCspC1YHdm:LBXu9HGaVHaJK3I3uZoHuTofJr1Y/YGW

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks