General
-
Target
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19
-
Size
29KB
-
Sample
250328-sx28pazlz3
-
MD5
4bdf6ff55589f81e261c5f8ce04eddf3
-
SHA1
920140ce2dedee06b09c9e271e810cb34da5080f
-
SHA256
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19
-
SHA512
3dad6863ec0565613ae13c132d84e2873020395188ab1dbceba06e6eeffb45251c5313a7758f37f662eaa92bb0a4d63c6e1cbc490c6ea6087f7e68cbb617cceb
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/qhY:AEwVs+0jNDY1qi/qyW
Behavioral task
behavioral1
Sample
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19
-
Size
29KB
-
MD5
4bdf6ff55589f81e261c5f8ce04eddf3
-
SHA1
920140ce2dedee06b09c9e271e810cb34da5080f
-
SHA256
2750801e815da91a4cbee9754040cf35c7e768be13044cdf5c39788c7fa08c19
-
SHA512
3dad6863ec0565613ae13c132d84e2873020395188ab1dbceba06e6eeffb45251c5313a7758f37f662eaa92bb0a4d63c6e1cbc490c6ea6087f7e68cbb617cceb
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/qhY:AEwVs+0jNDY1qi/qyW
-
Detected microsoft outlook phishing page
-
Detects MyDoom family
-
Mydoom family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1