General

  • Target

    SHIPINNG DOCUMENT 620849735001.rar

  • Size

    1.6MB

  • Sample

    240920-e3netsycpg

  • MD5

    d7cb604751e700e4148c473c6ccb4115

  • SHA1

    56c29734b63cb2a2b6df3978362b7f693b0654a1

  • SHA256

    cb8e5266fe45febb30137ca866e9c5f2b424985ca2947028c08c082d6290fcba

  • SHA512

    9c8f72b61e8aaa24e4df69306c3606d6b2716318ae2d0aa78a370a140f94689720f6127a2e56c48dc52fd15b0d4c0f3c4cce0829e25661dac97f64e782ed4469

  • SSDEEP

    49152:eKUHZQGu1MvD31L9XglI3MevCSU/+qwh+5:sHZjuerFcre87

Score
10/10

Malware Config

Targets

    • Target

      Znkzcxi.exe

    • Size

      1.7MB

    • MD5

      be852e807a629c65f1b41617c8348f2c

    • SHA1

      05d64861185f84e071d8c98eaf7ea86d22bd921d

    • SHA256

      b1b74ff5c67cfdc16f1cb30db9b885046c4c5d71af575a2d3de4a79918c1ce89

    • SHA512

      116f8da7c3c1bd69c3ff600348c35f4ad181f1c47a093d7224118c26c8d9ac03cba220dddb9d3fb7fdbf7aab52ff78fd9f064956007d6480ddb4d6ea38e6cea8

    • SSDEEP

      49152:fU/FMktb3x+muH5i44fTco84Ws5zwgio:cdMEb3x+mulIoh4H1i

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks