General

  • Target

    fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06

  • Size

    80KB

  • Sample

    241211-gpc32svkgp

  • MD5

    aedfd27750266a64af84e27df66c01b2

  • SHA1

    9338667b6262d21c9cb9a7654cd6997267e1eaca

  • SHA256

    fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06

  • SHA512

    6d54eee4c122dcea1936f1bc524da91ddfe4b8f33d96c51aac8f934be5ea9a80a3e35d062e8e28dec59936aeaf0b8c91c2f3197463dcbfc8fdbe7cf2e9975d22

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEDvME:5dbwovEVyqgoZmZXWfIdQdRaefPM

Malware Config

Targets

    • Target

      fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06

    • Size

      80KB

    • MD5

      aedfd27750266a64af84e27df66c01b2

    • SHA1

      9338667b6262d21c9cb9a7654cd6997267e1eaca

    • SHA256

      fbd743a17a7b357824d27d4a2d225e5592f169f54c299e582c3d976afe413b06

    • SHA512

      6d54eee4c122dcea1936f1bc524da91ddfe4b8f33d96c51aac8f934be5ea9a80a3e35d062e8e28dec59936aeaf0b8c91c2f3197463dcbfc8fdbe7cf2e9975d22

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEDvME:5dbwovEVyqgoZmZXWfIdQdRaefPM

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks