General
-
Target
0e9b8947fca8ab1911af9d116b577acb0698ba47b5f7ea96d193504ac3daacc0.exe
-
Size
29KB
-
Sample
241125-dfb8lszrfq
-
MD5
214eef28d0c7cff479f38c1bc122c0f8
-
SHA1
d8132b392cf284dd6946d5e127d00448e9f7cf5e
-
SHA256
0e9b8947fca8ab1911af9d116b577acb0698ba47b5f7ea96d193504ac3daacc0
-
SHA512
f1e856ef49f87f6c83d891f785593744fdfdae352efbe52ff6f1536bac958ede6b9973b417215e688dbb1f9c28bf6420eefcf014cc247e4273b20be1578845c2
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Wu3b:AEwVs+0jNDY1qi/qd
Behavioral task
behavioral1
Sample
0e9b8947fca8ab1911af9d116b577acb0698ba47b5f7ea96d193504ac3daacc0.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0e9b8947fca8ab1911af9d116b577acb0698ba47b5f7ea96d193504ac3daacc0.exe
-
Size
29KB
-
MD5
214eef28d0c7cff479f38c1bc122c0f8
-
SHA1
d8132b392cf284dd6946d5e127d00448e9f7cf5e
-
SHA256
0e9b8947fca8ab1911af9d116b577acb0698ba47b5f7ea96d193504ac3daacc0
-
SHA512
f1e856ef49f87f6c83d891f785593744fdfdae352efbe52ff6f1536bac958ede6b9973b417215e688dbb1f9c28bf6420eefcf014cc247e4273b20be1578845c2
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Wu3b:AEwVs+0jNDY1qi/qd
-
Detects MyDoom family
-
Mydoom family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1