General

  • Target

    5b1da6edb6302bc17946d43ad1acfbb0N

  • Size

    76KB

  • Sample

    240915-l11eyaxgng

  • MD5

    5b1da6edb6302bc17946d43ad1acfbb0

  • SHA1

    f061d19bcc0e7662727b3383876013bc5385b177

  • SHA256

    7dab21bec74793fb2e985aaa3e6347981b189a3cd3c68420c7c7f8c848c7dcd9

  • SHA512

    de9f4969915cb219c67700e7fd5324e10e270dc632ee71c0206def8a94afa8fc101b14f26f3dbd15b0cc1fc01c522985ffcd52651ed425a1f98470c6885626f1

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z/ONsb:c8y93KQjy7G55riF1cMo03dgi

Malware Config

Targets

    • Target

      5b1da6edb6302bc17946d43ad1acfbb0N

    • Size

      76KB

    • MD5

      5b1da6edb6302bc17946d43ad1acfbb0

    • SHA1

      f061d19bcc0e7662727b3383876013bc5385b177

    • SHA256

      7dab21bec74793fb2e985aaa3e6347981b189a3cd3c68420c7c7f8c848c7dcd9

    • SHA512

      de9f4969915cb219c67700e7fd5324e10e270dc632ee71c0206def8a94afa8fc101b14f26f3dbd15b0cc1fc01c522985ffcd52651ed425a1f98470c6885626f1

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z/ONsb:c8y93KQjy7G55riF1cMo03dgi

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks