General

  • Target

    4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb

  • Size

    422KB

  • Sample

    221002-jtt88seff6

  • MD5

    6b32d61d63952184bd5333fe13319fe0

  • SHA1

    f478f373bbca84edfe3d030a0255608fd48169ff

  • SHA256

    4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb

  • SHA512

    0d693518b0ca6070d9d63e782c730b6cb3381d52fb407feac1b4c13bf5034b30726abcf17fb9b7695c188be0a6f9056aa3525d11d8e7679cd68b616a542b4d28

  • SSDEEP

    6144:FL5L00kAaEGd9ZXDDHP4Kv9JAASWX37/Gv7VPCtC4XUPoB6trJ5k8MOWqjdq:j7kATGd9ZTDHwKvXF4EtC4gqKJWmWmdq

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb

    • Size

      422KB

    • MD5

      6b32d61d63952184bd5333fe13319fe0

    • SHA1

      f478f373bbca84edfe3d030a0255608fd48169ff

    • SHA256

      4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb

    • SHA512

      0d693518b0ca6070d9d63e782c730b6cb3381d52fb407feac1b4c13bf5034b30726abcf17fb9b7695c188be0a6f9056aa3525d11d8e7679cd68b616a542b4d28

    • SSDEEP

      6144:FL5L00kAaEGd9ZXDDHP4Kv9JAASWX37/Gv7VPCtC4XUPoB6trJ5k8MOWqjdq:j7kATGd9ZTDHwKvXF4EtC4gqKJWmWmdq

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks