General

  • Target

    4177267c7688e0a4879695e76b87c4f00f91189a318288c9345a2fb3a9d50664

  • Size

    1.2MB

  • Sample

    210913-jnprkagceq

  • MD5

    3719c2d7abe621d208c853cc425861d2

  • SHA1

    3f317891a950a1a5e01b7e10715f8d62e5cf0f1f

  • SHA256

    4177267c7688e0a4879695e76b87c4f00f91189a318288c9345a2fb3a9d50664

  • SHA512

    d43c7487903a043cdd73fe3de3cdd87f9fe40277cdad55356061f6771b76f427049d5354b9c8f308badc946f451070d281d0421e9f8623d6922e7c59a10ae449

Score
10/10

Malware Config

Targets

    • Target

      4177267c7688e0a4879695e76b87c4f00f91189a318288c9345a2fb3a9d50664

    • Size

      1.2MB

    • MD5

      3719c2d7abe621d208c853cc425861d2

    • SHA1

      3f317891a950a1a5e01b7e10715f8d62e5cf0f1f

    • SHA256

      4177267c7688e0a4879695e76b87c4f00f91189a318288c9345a2fb3a9d50664

    • SHA512

      d43c7487903a043cdd73fe3de3cdd87f9fe40277cdad55356061f6771b76f427049d5354b9c8f308badc946f451070d281d0421e9f8623d6922e7c59a10ae449

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Command and Control

Connection Proxy

1
T1090

Tasks