General

  • Target

    e893dbe6b911e8faea85dad69061e2755ef52db23bc5163f7c5dfd4138f29d6e

  • Size

    364KB

  • Sample

    241223-wd1gjawpcp

  • MD5

    4e8ddbbb780ed54690dc219a3120edb4

  • SHA1

    9fbecaf37a0679b668bc31d4c4ae1a331d46be39

  • SHA256

    e893dbe6b911e8faea85dad69061e2755ef52db23bc5163f7c5dfd4138f29d6e

  • SHA512

    8344f13282047055647b2419226c02810f51baa0c1041b51baf1cdedefcdec0418e38b4b999a806470a64efa8f3dbffc823eb029b987df25e82a58bb17e2b17e

  • SSDEEP

    6144:yVIIuZIIqV7bCJvcsYrHiWdXjwDA++nO2VSD2EdHUhb9uwPn/Dxd:yVI9Ij5mCskHlUDA+iOL1HUhb9xxd

Score
10/10

Malware Config

Targets

    • Target

      kdump64.dll

    • Size

      148KB

    • MD5

      d5dcfc5ac42bcba55a1170756f3493f4

    • SHA1

      1bcefa919e0c9c1d114ed6384e4aff8f316482de

    • SHA256

      8ba00843b9aba2cff6f2234a7daf040aadfebce4c05b13061da63b48f63bfa4f

    • SHA512

      dbaf78188b53629d667bdcb4fcdc0c35045e77330bbe209739c86fbe2d7c2ba04b3adeedc6576186e1af20f8eb373a9788ed3b0050f80f61485475dcf23b0a24

    • SSDEEP

      3072:+hNbJ07kFlBFBTmIw61ReXqiZmh1rx3o1v6Al7JyvITb/:+nbOcB76IJPevmh46Al3

    Score
    7/10
    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Target

      wps.exe

    • Size

      177KB

    • MD5

      f44992d14033a2b5b1064104658a29e1

    • SHA1

      62673aa6e8bde17f218524cbe3bf50cb5b949f3b

    • SHA256

      331f64d6d6bf7883ed8a3c29ab8ce3bf947aaecf49748a7a2b5113ced68607a4

    • SHA512

      9a57d5765e9dcff8caccf8b51449bfd8d35f9c346c9a09a5c64a7229136490bc1cb5a3f07c8d9c75aaf48e16e01700c3d6674fc1b8d170ce927913c4130bc31b

    • SSDEEP

      3072:65nSsRkXPsSadfviPNPVY5bYm1wkUBL/1cAR+oOb5vENb/fZOKeb0WhmNNdnLeny:65SsRkXPYGPG5cm6Bd3oEt/fZOaBi/fi

    Score
    10/10
    • Detects PlugX payload

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Plugx family

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.