General

  • Target

    a4ff850f93f3be378fe7c3df4cd73f707d5ca5322ac04172f884f1b0d2d3c529.zip

  • Size

    942KB

  • Sample

    241002-bwl2msthlc

  • MD5

    c02781167fe9c3e3e79cf1f6715347c4

  • SHA1

    0a230eb1198c4e7c536e6b2fb40f4be4e892fd18

  • SHA256

    a4ff850f93f3be378fe7c3df4cd73f707d5ca5322ac04172f884f1b0d2d3c529

  • SHA512

    56d6023a6e105481bdb3b9f0c46463762e456da52408bce976b7618bbb728db6dbec7498f90538650aa9342dc86182474e5ff704a2380bf6b31e5434313c695e

  • SSDEEP

    24576:dpoRMzATf5oIIn/5Q7VQNvMM+QD2lHj9ES:kMzATf5enRwVi5+Pb

Score
5/10

Malware Config

Targets

    • Target

      SOA SEPT 2024.exe

    • Size

      1003KB

    • MD5

      7de4b784900d60ed142a8f7ce638fd10

    • SHA1

      7176ce1be20c1cb7c552a4775dbf5ba7311264a2

    • SHA256

      c0bafa73d2663b05216a5ad7d1dac974f578eada133b56f157e2d73d666b7721

    • SHA512

      e921be630f12242cb275c135a68b20a60c506612be1042b13ac0c806e1ece39465ff8d903e645f9c82109d96b5b4e5150ba0c914ffa36d05998b9505c3c6ffcd

    • SSDEEP

      24576:qD0tM85tbNJjldeYiYHkgIpos2n158Rjatv2c+Qb23TfXmq:qD0tM85DJjl/iWPIpSnTCjS9+j/

    Score
    5/10
    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks