General

  • Target

    3c3a3e87ec02e301b748c730a7c379424e93e6f3bbe2128000b8f33084b7d641

  • Size

    422KB

  • Sample

    220703-j3srrsbegp

  • MD5

    cfca9ac2b0a1b969f80dfa7f76ed131e

  • SHA1

    404c46ee53a8a47941a342bb2924e5cd5ff0495d

  • SHA256

    3c3a3e87ec02e301b748c730a7c379424e93e6f3bbe2128000b8f33084b7d641

  • SHA512

    f9a42bcf75b76dada47a0febb9710b72a2a1f2c31b1c9e01fb4533edd159664fd55e784d13dc191603e52946b97aa96e5a923fbaf1237273d873bfe7573e189b

Malware Config

Targets

    • Target

      3c3a3e87ec02e301b748c730a7c379424e93e6f3bbe2128000b8f33084b7d641

    • Size

      422KB

    • MD5

      cfca9ac2b0a1b969f80dfa7f76ed131e

    • SHA1

      404c46ee53a8a47941a342bb2924e5cd5ff0495d

    • SHA256

      3c3a3e87ec02e301b748c730a7c379424e93e6f3bbe2128000b8f33084b7d641

    • SHA512

      f9a42bcf75b76dada47a0febb9710b72a2a1f2c31b1c9e01fb4533edd159664fd55e784d13dc191603e52946b97aa96e5a923fbaf1237273d873bfe7573e189b

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • OnlyLogger Payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks