General

  • Target

    a36be4f1b9d259635f3a83055ed9676da391b9080e8347d62a1e1bbc3033edc5

  • Size

    182KB

  • Sample

    220803-xmv4vaeda6

  • MD5

    eaf1e3f46e1e88708c3f5e1c356f6f3d

  • SHA1

    d628b46206109eb503ea6f0ce544f167dffb5148

  • SHA256

    a36be4f1b9d259635f3a83055ed9676da391b9080e8347d62a1e1bbc3033edc5

  • SHA512

    de080be1a3ef4fd6c3c7c7cdd30bc6307e3b7d980eede39ce541cecab1a4e73e66863b2d883785fbfcb4b6b7c6ebfe34d6026ddeb3c445bcd10520c8ef7df4f9

Score
8/10

Malware Config

Targets

    • Target

      a36be4f1b9d259635f3a83055ed9676da391b9080e8347d62a1e1bbc3033edc5

    • Size

      182KB

    • MD5

      eaf1e3f46e1e88708c3f5e1c356f6f3d

    • SHA1

      d628b46206109eb503ea6f0ce544f167dffb5148

    • SHA256

      a36be4f1b9d259635f3a83055ed9676da391b9080e8347d62a1e1bbc3033edc5

    • SHA512

      de080be1a3ef4fd6c3c7c7cdd30bc6307e3b7d980eede39ce541cecab1a4e73e66863b2d883785fbfcb4b6b7c6ebfe34d6026ddeb3c445bcd10520c8ef7df4f9

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks