General

  • Target

    d067f8ef819c25807e5478134c851bcf

  • Size

    609KB

  • Sample

    211217-sl8lbsdgd7

  • MD5

    d067f8ef819c25807e5478134c851bcf

  • SHA1

    216d152d2a403abba3da5883b0ca0a4779b1fb0c

  • SHA256

    78b865f64fe5efe0edb30e932584693c69c5e5b51e4877d3db7aeb19f85d0665

  • SHA512

    51e625e92efd7cea58e27b6a95154323ff8859edb71b1ad8cb65f24ec3233a973b7bfcf32d330f1e42ab97a9fe8ff85ecb768adeee207e534625d1457e12120c

Score
10/10

Malware Config

Targets

    • Target

      d067f8ef819c25807e5478134c851bcf

    • Size

      609KB

    • MD5

      d067f8ef819c25807e5478134c851bcf

    • SHA1

      216d152d2a403abba3da5883b0ca0a4779b1fb0c

    • SHA256

      78b865f64fe5efe0edb30e932584693c69c5e5b51e4877d3db7aeb19f85d0665

    • SHA512

      51e625e92efd7cea58e27b6a95154323ff8859edb71b1ad8cb65f24ec3233a973b7bfcf32d330f1e42ab97a9fe8ff85ecb768adeee207e534625d1457e12120c

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks