General

  • Target

    a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90

  • Size

    80KB

  • Sample

    250102-c6ldjaypds

  • MD5

    211ed6cf8da10c850d7de82e73d2cbe9

  • SHA1

    f64db5cabda0a4bc471069022e729465f7c545b1

  • SHA256

    a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90

  • SHA512

    9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD

Malware Config

Targets

    • Target

      a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90

    • Size

      80KB

    • MD5

      211ed6cf8da10c850d7de82e73d2cbe9

    • SHA1

      f64db5cabda0a4bc471069022e729465f7c545b1

    • SHA256

      a05b43f0ff416c7c1c3f2310f24fb38860a3c59468a531956feb6c3f5a314c90

    • SHA512

      9e344a0bf2b8c2698c3c1cbafd72f4f54a21ba05b1f4e559a0c682b9f9e871ef2b2e5a0e80e6328b44230a9572e16af3c98380983eb8207929c46ce9a21ef64c

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEXG3T:5dbwovEVyqgoZmZXWfIdQdRaefPzD

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks