General

  • Target

    ed6b74338dd7afe8b520deb96cff9068fbad77f30da41ed14257de9ef420b825

  • Size

    458KB

  • Sample

    220731-hh12zadbe9

  • MD5

    84bab2aca37b071c5e0edf52dab69c20

  • SHA1

    ea336038285372f5db2e209b3c0dcbb453c207a2

  • SHA256

    ed6b74338dd7afe8b520deb96cff9068fbad77f30da41ed14257de9ef420b825

  • SHA512

    143d4f2b82d02ca7aea8ac45a5933b62403e8590d5e197aaaf21ca371f36eade9cab58483a6c3f6ab09c72a5cdb2e91c2f4000931f1de8c72ffce3f745f4cb8a

Score
10/10

Malware Config

Targets

    • Target

      ed6b74338dd7afe8b520deb96cff9068fbad77f30da41ed14257de9ef420b825

    • Size

      458KB

    • MD5

      84bab2aca37b071c5e0edf52dab69c20

    • SHA1

      ea336038285372f5db2e209b3c0dcbb453c207a2

    • SHA256

      ed6b74338dd7afe8b520deb96cff9068fbad77f30da41ed14257de9ef420b825

    • SHA512

      143d4f2b82d02ca7aea8ac45a5933b62403e8590d5e197aaaf21ca371f36eade9cab58483a6c3f6ab09c72a5cdb2e91c2f4000931f1de8c72ffce3f745f4cb8a

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks