General

  • Target

    5e6764534b3a1e4d3abacc4810b6985d.exe_

  • Size

    740KB

  • Sample

    220924-z6qdtaddbl

  • MD5

    5e6764534b3a1e4d3abacc4810b6985d

  • SHA1

    f10ad287f126f577f197070453812a7e88c2cc52

  • SHA256

    e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0

  • SHA512

    532d2855e1b21433dbcc9c803f0538d99f6c3bddf0dd8321f552c7d16914dce4c2d2d3abd8028f45a4cf18109d430251d8fe8c63d30627e6fcc27d54cb42a188

Score
10/10

Malware Config

Targets

    • Target

      5e6764534b3a1e4d3abacc4810b6985d.exe_

    • Size

      740KB

    • MD5

      5e6764534b3a1e4d3abacc4810b6985d

    • SHA1

      f10ad287f126f577f197070453812a7e88c2cc52

    • SHA256

      e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0

    • SHA512

      532d2855e1b21433dbcc9c803f0538d99f6c3bddf0dd8321f552c7d16914dce4c2d2d3abd8028f45a4cf18109d430251d8fe8c63d30627e6fcc27d54cb42a188

    Score
    10/10
    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix

Collection

    Command and Control

    Credential Access

      Defense Evasion

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation