General

  • Target

    b3fc638f4248cfb72c623af8e3a2cffb0876bcd34a3d43ac65ea28852cb1a074

  • Size

    68KB

  • Sample

    220725-b5vp5shgfn

  • MD5

    56c6c8bbd5bb84959c51333f25f61de3

  • SHA1

    0520650a6f9971efc411ce98cb3c4076642ddbf0

  • SHA256

    b3fc638f4248cfb72c623af8e3a2cffb0876bcd34a3d43ac65ea28852cb1a074

  • SHA512

    f2f6ad74c19beb033a027e7ff9b71925ac4b906408959ad60c963f00b84861785749299494aaf45cbfab05cc3924b6b73a011cd4d609d29c8d147ccdf84e8b84

Score
10/10

Malware Config

Targets

    • Target

      b3fc638f4248cfb72c623af8e3a2cffb0876bcd34a3d43ac65ea28852cb1a074

    • Size

      68KB

    • MD5

      56c6c8bbd5bb84959c51333f25f61de3

    • SHA1

      0520650a6f9971efc411ce98cb3c4076642ddbf0

    • SHA256

      b3fc638f4248cfb72c623af8e3a2cffb0876bcd34a3d43ac65ea28852cb1a074

    • SHA512

      f2f6ad74c19beb033a027e7ff9b71925ac4b906408959ad60c963f00b84861785749299494aaf45cbfab05cc3924b6b73a011cd4d609d29c8d147ccdf84e8b84

    Score
    10/10
    • suricata: ET MALWARE Common Upatre Header Structure 2

      suricata: ET MALWARE Common Upatre Header Structure 2

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks