General

  • Target

    6729001591617.bin

  • Size

    3.6MB

  • Sample

    210128-ljnc58c5ms

  • MD5

    8e8f7ff797c292231959e4dd410a98da

  • SHA1

    5fba19ae9f76b445d96dbca71f53113492b09d49

  • SHA256

    ace9f321c9967b2ffe3bef9056c113b20040fe8831351082e186125aeea8ab0b

  • SHA512

    c1e510a6d5f57eaad3b744e20145c07241b1e857e1a1832a0878cd6beedf115a40c8bfd655896d800579110687d208a59416044fdbd2811102aac334720a3c27

Malware Config

Targets

    • Target

      6729001591617.bin

    • Size

      3.6MB

    • MD5

      8e8f7ff797c292231959e4dd410a98da

    • SHA1

      5fba19ae9f76b445d96dbca71f53113492b09d49

    • SHA256

      ace9f321c9967b2ffe3bef9056c113b20040fe8831351082e186125aeea8ab0b

    • SHA512

      c1e510a6d5f57eaad3b744e20145c07241b1e857e1a1832a0878cd6beedf115a40c8bfd655896d800579110687d208a59416044fdbd2811102aac334720a3c27

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Command and Control

Connection Proxy

1
T1090

Tasks