General

  • Target

    2bb0000.exe

  • Size

    434KB

  • Sample

    210504-ea5kd82f4e

  • MD5

    1cdb3fb1f8aceed1ebe8dbf591f3d8db

  • SHA1

    21bd149cf8eec05f453665b888aae9b2b8e62320

  • SHA256

    4bd4ccdaefa72f9326ba93542ddc447f6df1452a6f626a54d43c3a4c37e23968

  • SHA512

    4df44aea1de81ee299cc0944d14da5a28290d1d3cf60691bf85a650ea12e4be73017f68bbb01466f757203e9f6d4fbdb3446a468f241a9383b35cd8f681b3021

Score
10/10

Malware Config

Targets

    • Target

      2bb0000.exe

    • Size

      434KB

    • MD5

      1cdb3fb1f8aceed1ebe8dbf591f3d8db

    • SHA1

      21bd149cf8eec05f453665b888aae9b2b8e62320

    • SHA256

      4bd4ccdaefa72f9326ba93542ddc447f6df1452a6f626a54d43c3a4c37e23968

    • SHA512

      4df44aea1de81ee299cc0944d14da5a28290d1d3cf60691bf85a650ea12e4be73017f68bbb01466f757203e9f6d4fbdb3446a468f241a9383b35cd8f681b3021

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks