General

  • Target

    2024-11-07_86c6b05270ea462b24f9fa39e8f8b3a5_hijackloader_luca-stealer_magniber_poet-rat_zxxz

  • Size

    23.7MB

  • Sample

    241107-twp3eawaqq

  • MD5

    86c6b05270ea462b24f9fa39e8f8b3a5

  • SHA1

    8277479f6e6e9a533144a79897f1423c78a20491

  • SHA256

    aa0243615771e164c4bd2a98e1f6807418d45330b083831671d0629d10e98d20

  • SHA512

    ed3d08f005fef872939059d07a817fda9e3a37d7b5593e1b04e9d22d52528f709489733917f489ee032f385be58994b99d811072eb157649faa547948bdf62df

  • SSDEEP

    196608:A0QM8t8WGl814NjONUWeiHit/bcVsuBg07pbAB5xfyBd:A0Q6l8YWeipCO

Score
7/10

Malware Config

Targets

    • Target

      2024-11-07_86c6b05270ea462b24f9fa39e8f8b3a5_hijackloader_luca-stealer_magniber_poet-rat_zxxz

    • Size

      23.7MB

    • MD5

      86c6b05270ea462b24f9fa39e8f8b3a5

    • SHA1

      8277479f6e6e9a533144a79897f1423c78a20491

    • SHA256

      aa0243615771e164c4bd2a98e1f6807418d45330b083831671d0629d10e98d20

    • SHA512

      ed3d08f005fef872939059d07a817fda9e3a37d7b5593e1b04e9d22d52528f709489733917f489ee032f385be58994b99d811072eb157649faa547948bdf62df

    • SSDEEP

      196608:A0QM8t8WGl814NjONUWeiHit/bcVsuBg07pbAB5xfyBd:A0Q6l8YWeipCO

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks