General

  • Target

    test.txt

  • Size

    329KB

  • Sample

    210910-lpzn9shhc6

  • MD5

    af6cc661c03857f4cbf6c325ebe27743

  • SHA1

    7fde4507b2430e37c7dc9a1df8904371bc1bf9b2

  • SHA256

    2fc970b717486762f6c890f525329962662074eb632f0827c901fb1081cbd98f

  • SHA512

    13e5fcbb68708f5079aca5fbc875e3d18a88fa591b8d74f208a0ba05b7af3dda55fc41466683a9963d81e41e2c39a9de5a3b0fbc0d7f1c51c28ba070c3a44b61

Score
10/10

Malware Config

Targets

    • Target

      test.txt

    • Size

      329KB

    • MD5

      af6cc661c03857f4cbf6c325ebe27743

    • SHA1

      7fde4507b2430e37c7dc9a1df8904371bc1bf9b2

    • SHA256

      2fc970b717486762f6c890f525329962662074eb632f0827c901fb1081cbd98f

    • SHA512

      13e5fcbb68708f5079aca5fbc875e3d18a88fa591b8d74f208a0ba05b7af3dda55fc41466683a9963d81e41e2c39a9de5a3b0fbc0d7f1c51c28ba070c3a44b61

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks