General

  • Target

    9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46

  • Size

    269KB

  • Sample

    210405-t1694m6xqx

  • MD5

    ba28a06e2aae1052319541d4124122c5

  • SHA1

    20613e49ee5b14dc04c7b045900f1d0e1b4173be

  • SHA256

    9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46

  • SHA512

    9aaaa26c106043d56c48f89b3dd7b84ba9bbf7951c5e82a622d0eb93169e9520643bd5cb6b49dbd1cce7f5cd776e6b62b855266c099304acd3b9faa703187f25

Score
8/10

Malware Config

Targets

    • Target

      9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46

    • Size

      269KB

    • MD5

      ba28a06e2aae1052319541d4124122c5

    • SHA1

      20613e49ee5b14dc04c7b045900f1d0e1b4173be

    • SHA256

      9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46

    • SHA512

      9aaaa26c106043d56c48f89b3dd7b84ba9bbf7951c5e82a622d0eb93169e9520643bd5cb6b49dbd1cce7f5cd776e6b62b855266c099304acd3b9faa703187f25

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks