General

  • Target

    4ccp359.jpg

  • Size

    70KB

  • Sample

    240626-26y23azapb

  • MD5

    34f410ad1ff68298fc0a3ce912e5c78b

  • SHA1

    12c800a2e7a939d49fe4a150a621f55bd8cba24c

  • SHA256

    b4d1f0c0b99c6abafddcb654aef4b8c93a8704f40af5970d7317751e2af4eaf9

  • SHA512

    0aa714524c6b2686556d0fb246ac66d4cfa354f8555eb32b7229cb9ab1bcd41759ecc99cde1fce92e971f2279c9ccb4fc13b0ad9977425038c37e6e010bc5f1b

  • SSDEEP

    1536:nwSz6b/d5ORv1KegYrViOQqhpxyQbsYMufhCzrIR5ZGL3zeZP:nwDnORvU8rPbhpx1YYZczMRb/P

Score
8/10

Malware Config

Targets

    • Target

      4ccp359.jpg

    • Size

      70KB

    • MD5

      34f410ad1ff68298fc0a3ce912e5c78b

    • SHA1

      12c800a2e7a939d49fe4a150a621f55bd8cba24c

    • SHA256

      b4d1f0c0b99c6abafddcb654aef4b8c93a8704f40af5970d7317751e2af4eaf9

    • SHA512

      0aa714524c6b2686556d0fb246ac66d4cfa354f8555eb32b7229cb9ab1bcd41759ecc99cde1fce92e971f2279c9ccb4fc13b0ad9977425038c37e6e010bc5f1b

    • SSDEEP

      1536:nwSz6b/d5ORv1KegYrViOQqhpxyQbsYMufhCzrIR5ZGL3zeZP:nwDnORvU8rPbhpx1YYZczMRb/P

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks