General

  • Target

    5890798F97F9144206499433A5DB3011.zip

  • Size

    202KB

  • Sample

    250113-w5df3svlhq

  • MD5

    39eb5d149bf0ef80cf1f3b316b64acf9

  • SHA1

    afd8cb44b4922bc5fde65d7a5942373bd6c5a9bb

  • SHA256

    1baf6b4580563c43bfcf27751c7773f103c584461197932bee9e6cce94e97833

  • SHA512

    69787ace1018646426d4f0f357c38ba2757f61133d3d41d4e6362c43b035df5fe72e038d92eb795d17eada84c7fc00e027b86ce2b56ec32db7a3288d22ae9f09

  • SSDEEP

    6144:4vSDvlEBjZ9TBKYdfsaUrmTPvSdMrvU2lTcCA:4qwt9TB30N6PXrvXTzA

Malware Config

Targets

    • Target

      5890798F97F9144206499433A5DB3011

    • Size

      701KB

    • MD5

      5890798f97f9144206499433a5db3011

    • SHA1

      1c9c488123a81bf8d2216ac57c089e056f899433

    • SHA256

      69be5428a0e939a5bf4453b34aad1a86791ab75411b6a339d727197f82bc8411

    • SHA512

      964f340060a67abed11d06ac40cb8cb2577f985e8815cc12f306e37a716792ae8edac02645d0cddeea5d81f72ef402363c909b6f510eb2a37c76f1cf56caada9

    • SSDEEP

      6144:57A/MmghsENIsRctX5rUvQSNj0LZOWM8yucn:5U/Mv0rU1Nj0LZOd8yus

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.