General

  • Target

    IMAGE00212100.jar

  • Size

    97KB

  • Sample

    210421-t82n2sa5t6

  • MD5

    37b7089dba76d821305beb59ca39892a

  • SHA1

    f03546906362d47c67cd10bcded9359fb5e34cad

  • SHA256

    b6db4227e93019664a1a77dbbcf1482a4d5199a2f24b06b9805afd6b34c0d9c6

  • SHA512

    761ecf3ee3ebb21399192dbc1db647bc1af33771fd541be061ed27fa4a9945b21ac3fce82de10236c9223b1ba9abe2d6ef2ebfe789c8a3727da05769f9eb8884

Score
7/10

Malware Config

Targets

    • Target

      IMAGE00212100.jar

    • Size

      97KB

    • MD5

      37b7089dba76d821305beb59ca39892a

    • SHA1

      f03546906362d47c67cd10bcded9359fb5e34cad

    • SHA256

      b6db4227e93019664a1a77dbbcf1482a4d5199a2f24b06b9805afd6b34c0d9c6

    • SHA512

      761ecf3ee3ebb21399192dbc1db647bc1af33771fd541be061ed27fa4a9945b21ac3fce82de10236c9223b1ba9abe2d6ef2ebfe789c8a3727da05769f9eb8884

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks