General

  • Target

    55444f698857902da38a1451c5313e9a31c835b353466ee445c5a5545b088971N

  • Size

    84KB

  • Sample

    240928-eq62eayerg

  • MD5

    4f4b6e301fb2bf7290c39a4c9f6f3ac0

  • SHA1

    9a4095a14a256a9e162a4a130bf9b81a2c4c0893

  • SHA256

    55444f698857902da38a1451c5313e9a31c835b353466ee445c5a5545b088971

  • SHA512

    171147b26019e1d54a4c65553307261b114fa4a39b7ced6f7ba3adcdb3cb4549188320cdfa84b9e0a54ca23d9fa1352b4bd1bcebc342dd041cadaa49ca107e22

  • SSDEEP

    1536:3Xn1JYSnExFkcgKKjxfmqshiKW5Xs/iYQqQJtsWFcdfRMvb+xWeESlq+7:HE3x5KBDYiKWm/iSw0fRMvygloq+7

Score
8/10

Malware Config

Targets

    • Target

      55444f698857902da38a1451c5313e9a31c835b353466ee445c5a5545b088971N

    • Size

      84KB

    • MD5

      4f4b6e301fb2bf7290c39a4c9f6f3ac0

    • SHA1

      9a4095a14a256a9e162a4a130bf9b81a2c4c0893

    • SHA256

      55444f698857902da38a1451c5313e9a31c835b353466ee445c5a5545b088971

    • SHA512

      171147b26019e1d54a4c65553307261b114fa4a39b7ced6f7ba3adcdb3cb4549188320cdfa84b9e0a54ca23d9fa1352b4bd1bcebc342dd041cadaa49ca107e22

    • SSDEEP

      1536:3Xn1JYSnExFkcgKKjxfmqshiKW5Xs/iYQqQJtsWFcdfRMvb+xWeESlq+7:HE3x5KBDYiKWm/iSw0fRMvygloq+7

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

MITRE ATT&CK Enterprise v15

Tasks