General

  • Target

    images (2).jpeg

  • Size

    28KB

  • Sample

    250401-qynqkszscy

  • MD5

    348944c7d1c12628f9bb192cd1e31849

  • SHA1

    c541854d4ca3ee81b9fc9992c6b6d5da87b26589

  • SHA256

    817a301635ed82f6984dd3c0288f7109f062cc3a5e2c72fe3cd00e0df921a4e8

  • SHA512

    61838d74a6bdbabe8dc5abd3405afbdd12257cfa2c20c4f492c769e9f623094b29fe66589b9247224a07ef0655cc7b69e89caf92d73ad56fec0ce67f0fbcf664

  • SSDEEP

    768:AFx4Nht48QUbL+ftzJo09wwQx5vL1weqR0ppxZ/2dOZnQ:AFx454GbL+FzC0YhhI2/2dOVQ

Malware Config

Targets

    • Target

      images (2).jpeg

    • Size

      28KB

    • MD5

      348944c7d1c12628f9bb192cd1e31849

    • SHA1

      c541854d4ca3ee81b9fc9992c6b6d5da87b26589

    • SHA256

      817a301635ed82f6984dd3c0288f7109f062cc3a5e2c72fe3cd00e0df921a4e8

    • SHA512

      61838d74a6bdbabe8dc5abd3405afbdd12257cfa2c20c4f492c769e9f623094b29fe66589b9247224a07ef0655cc7b69e89caf92d73ad56fec0ce67f0fbcf664

    • SSDEEP

      768:AFx4Nht48QUbL+ftzJo09wwQx5vL1weqR0ppxZ/2dOZnQ:AFx454GbL+FzC0YhhI2/2dOVQ

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks