Resubmissions

22-09-2021 14:15

210922-rkjp5sfecr 10

General

  • Target

    017a7ccf3e5eb12c679dad6b9897c1ea788975d6e5e90e4ddf59df981dd11ec1

  • Size

    527KB

  • Sample

    210922-rkjp5sfecr

  • MD5

    afca14738e00c61a837d450b38a3f067

  • SHA1

    bc07bcaa858fd87418563b54f1e3197a252c0ee8

  • SHA256

    017a7ccf3e5eb12c679dad6b9897c1ea788975d6e5e90e4ddf59df981dd11ec1

  • SHA512

    50f084c2ffd0b6592bea5face7092294003812421009e8241c8045c117aa9ae4e802bd4fb56398df06670ffbad57683c9157fc1b91a28443720b13fbf300772c

Score
10/10

Malware Config

Targets

    • Target

      017a7ccf3e5eb12c679dad6b9897c1ea788975d6e5e90e4ddf59df981dd11ec1

    • Size

      527KB

    • MD5

      afca14738e00c61a837d450b38a3f067

    • SHA1

      bc07bcaa858fd87418563b54f1e3197a252c0ee8

    • SHA256

      017a7ccf3e5eb12c679dad6b9897c1ea788975d6e5e90e4ddf59df981dd11ec1

    • SHA512

      50f084c2ffd0b6592bea5face7092294003812421009e8241c8045c117aa9ae4e802bd4fb56398df06670ffbad57683c9157fc1b91a28443720b13fbf300772c

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Command and Control

Connection Proxy

1
T1090

Tasks