General

  • Target

    2f50000.exe

  • Size

    434KB

  • Sample

    210504-w56k6ejkba

  • MD5

    e2f99487e970a27006cf282abab1d49a

  • SHA1

    b5d6b3b95f265888ce74e1be495858928214eb00

  • SHA256

    7176b06d8ef959057db3fa2868695ee2d3e810353fb236923840903ddb47019a

  • SHA512

    40e23b344272daba585c707e7e6298450049102052ae516b7b98ca0591274676cdc4e9891d149204595388b0347ed701b42b65c64901683a17c930f925a19351

Score
10/10

Malware Config

Targets

    • Target

      2f50000.exe

    • Size

      434KB

    • MD5

      e2f99487e970a27006cf282abab1d49a

    • SHA1

      b5d6b3b95f265888ce74e1be495858928214eb00

    • SHA256

      7176b06d8ef959057db3fa2868695ee2d3e810353fb236923840903ddb47019a

    • SHA512

      40e23b344272daba585c707e7e6298450049102052ae516b7b98ca0591274676cdc4e9891d149204595388b0347ed701b42b65c64901683a17c930f925a19351

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks