General

  • Target

    PixelSignal.dll

  • Size

    512KB

  • Sample

    241217-bmqngawkax

  • MD5

    a4e3345491eaca250f1cc139db05a015

  • SHA1

    f09804b59a3aac7c1dd47c7e027182fb54f9a277

  • SHA256

    22c5858ff8c7815c34b4386c3b4c83f2b8bb23502d153f5d8fb9f55bd784e764

  • SHA512

    79ab4fb0e6f4823e3c4eac42748f0c31d5f0082fdfa9adb7f2b4924a6c165da9dc41b019657283daa63dfc18ad3c3d0ab182dc0ede21a9c1ce551e94a9f2e1f3

  • SSDEEP

    12288:hGcV/BCTLVkg1LdACH7OE7gF+ojxpq/C5zfidd:hGcyT5F1dA6qE7gFnxk/o0

Score
7/10

Malware Config

Targets

    • Target

      PixelSignal.dll

    • Size

      512KB

    • MD5

      a4e3345491eaca250f1cc139db05a015

    • SHA1

      f09804b59a3aac7c1dd47c7e027182fb54f9a277

    • SHA256

      22c5858ff8c7815c34b4386c3b4c83f2b8bb23502d153f5d8fb9f55bd784e764

    • SHA512

      79ab4fb0e6f4823e3c4eac42748f0c31d5f0082fdfa9adb7f2b4924a6c165da9dc41b019657283daa63dfc18ad3c3d0ab182dc0ede21a9c1ce551e94a9f2e1f3

    • SSDEEP

      12288:hGcV/BCTLVkg1LdACH7OE7gF+ojxpq/C5zfidd:hGcyT5F1dA6qE7gFnxk/o0

    Score
    7/10
    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks