General

  • Target

    77d4e3d0ad80253e9f99cfccc11e2b79cfffe8f91b79a502fcd793c284f13bab

  • Size

    518KB

  • Sample

    220731-fv3efshhc4

  • MD5

    08b7deae8aad4bf6108e5d2a896d5517

  • SHA1

    d7a2f366014c54e6b8588006fbf6eb5304e61976

  • SHA256

    77d4e3d0ad80253e9f99cfccc11e2b79cfffe8f91b79a502fcd793c284f13bab

  • SHA512

    6679ed9f47eadcc9a90af821c5c3e76bb18dbc65891bbb9a5ba7fa9c6683375e53e1c7a7bc09a9b419dd97de1fda327da29b99de6ad505207158557cf3f9220d

Score
10/10

Malware Config

Targets

    • Target

      77d4e3d0ad80253e9f99cfccc11e2b79cfffe8f91b79a502fcd793c284f13bab

    • Size

      518KB

    • MD5

      08b7deae8aad4bf6108e5d2a896d5517

    • SHA1

      d7a2f366014c54e6b8588006fbf6eb5304e61976

    • SHA256

      77d4e3d0ad80253e9f99cfccc11e2b79cfffe8f91b79a502fcd793c284f13bab

    • SHA512

      6679ed9f47eadcc9a90af821c5c3e76bb18dbc65891bbb9a5ba7fa9c6683375e53e1c7a7bc09a9b419dd97de1fda327da29b99de6ad505207158557cf3f9220d

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks