General

  • Target

    4acd4645740cff555bd5c7fdd8167a1ded999d4d5a0a6ad84fc5d998faa5c793.exe

  • Size

    426KB

  • Sample

    240703-bm7xratfqm

  • MD5

    ba07b8206eb155c5f8dfe3cff5750861

  • SHA1

    6e05876a4ab629879726f77c05c6ee8505262c49

  • SHA256

    4acd4645740cff555bd5c7fdd8167a1ded999d4d5a0a6ad84fc5d998faa5c793

  • SHA512

    e907e059ad6d6df06176badf98336d5da6f5e967dd4b25fe631b5832a17cf88e460565e3698f5a35fac5c3c20991b599b029732775509853f8f18929adce2073

  • SSDEEP

    6144:8Z5f30291xuMHlpw9wrvwewMdBtbIbd5xv6P/6CuCNJ0hOY9:8nk291kMHlpw6r4eL3IbxvoyClwz9

Score
10/10

Malware Config

Extracted

Family

mofongoloader

C2

https://checkcloudnet.com/check/connection

Targets

    • Target

      4acd4645740cff555bd5c7fdd8167a1ded999d4d5a0a6ad84fc5d998faa5c793.exe

    • Size

      426KB

    • MD5

      ba07b8206eb155c5f8dfe3cff5750861

    • SHA1

      6e05876a4ab629879726f77c05c6ee8505262c49

    • SHA256

      4acd4645740cff555bd5c7fdd8167a1ded999d4d5a0a6ad84fc5d998faa5c793

    • SHA512

      e907e059ad6d6df06176badf98336d5da6f5e967dd4b25fe631b5832a17cf88e460565e3698f5a35fac5c3c20991b599b029732775509853f8f18929adce2073

    • SSDEEP

      6144:8Z5f30291xuMHlpw9wrvwewMdBtbIbd5xv6P/6CuCNJ0hOY9:8nk291kMHlpw6r4eL3IbxvoyClwz9

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks