General

  • Target

    3175c7553b29a8e22676a4d4bd7b0ce2.exe

  • Size

    7.6MB

  • Sample

    201010-r86ph1jg7a

  • MD5

    3175c7553b29a8e22676a4d4bd7b0ce2

  • SHA1

    63af951a129db06f9d5a1be781e8bb9df818da9c

  • SHA256

    38a36c357a50c0f3d6ba6cbaa600507d485271ac452212850dff78f1a430f9e1

  • SHA512

    d5e87b6ba9448575f4be4988999d8050b1b6218ad505484e67c1bfacae4cfb55b0166105fe53dc148d99344e8b73f4a5df8ea8d8f73ebafce798221e8cf65067

Score
10/10

Malware Config

Targets

    • Target

      3175c7553b29a8e22676a4d4bd7b0ce2.exe

    • Size

      7.6MB

    • MD5

      3175c7553b29a8e22676a4d4bd7b0ce2

    • SHA1

      63af951a129db06f9d5a1be781e8bb9df818da9c

    • SHA256

      38a36c357a50c0f3d6ba6cbaa600507d485271ac452212850dff78f1a430f9e1

    • SHA512

      d5e87b6ba9448575f4be4988999d8050b1b6218ad505484e67c1bfacae4cfb55b0166105fe53dc148d99344e8b73f4a5df8ea8d8f73ebafce798221e8cf65067

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks