General

  • Target

    6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b

  • Size

    81KB

  • Sample

    250120-eajaeazkd1

  • MD5

    6bb30576e16ec5c1d1e9d47ed79843b6

  • SHA1

    6ffa3c6d61ee1b2410327621ceb35910ce55c8a2

  • SHA256

    6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b

  • SHA512

    aa4bd5cb6d465c05443d84c1ff589d09c3a8a77f72db5de35406f59b16549ae711846ac1c5f410fa891601b3626d8dfb4ef56630a28c2281d2e66c962e4c3c40

  • SSDEEP

    1536:T2RW5De37NXJNnuMJldOdZ+PgE056PRhIZj1C0McIMMjBwySXX:CRW5DUuIdP/s6ZhIZjMRcsjKySn

Malware Config

Targets

    • Target

      6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b

    • Size

      81KB

    • MD5

      6bb30576e16ec5c1d1e9d47ed79843b6

    • SHA1

      6ffa3c6d61ee1b2410327621ceb35910ce55c8a2

    • SHA256

      6af6a0a413641069fc7338e1683a1b73b4400459efd8f6c681f57590ee0a250b

    • SHA512

      aa4bd5cb6d465c05443d84c1ff589d09c3a8a77f72db5de35406f59b16549ae711846ac1c5f410fa891601b3626d8dfb4ef56630a28c2281d2e66c962e4c3c40

    • SSDEEP

      1536:T2RW5De37NXJNnuMJldOdZ+PgE056PRhIZj1C0McIMMjBwySXX:CRW5DUuIdP/s6ZhIZjMRcsjKySn

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks