General
-
Target
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb
-
Size
422KB
-
Sample
221002-jtt88seff6
-
MD5
6b32d61d63952184bd5333fe13319fe0
-
SHA1
f478f373bbca84edfe3d030a0255608fd48169ff
-
SHA256
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb
-
SHA512
0d693518b0ca6070d9d63e782c730b6cb3381d52fb407feac1b4c13bf5034b30726abcf17fb9b7695c188be0a6f9056aa3525d11d8e7679cd68b616a542b4d28
-
SSDEEP
6144:FL5L00kAaEGd9ZXDDHP4Kv9JAASWX37/Gv7VPCtC4XUPoB6trJ5k8MOWqjdq:j7kATGd9ZTDHwKvXF4EtC4gqKJWmWmdq
Static task
static1
Behavioral task
behavioral1
Sample
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Targets
-
-
Target
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb
-
Size
422KB
-
MD5
6b32d61d63952184bd5333fe13319fe0
-
SHA1
f478f373bbca84edfe3d030a0255608fd48169ff
-
SHA256
4ddf55e408dd3ae54be9444d0d4494bb688c5fcbfefcde259bbbbc557e7d61bb
-
SHA512
0d693518b0ca6070d9d63e782c730b6cb3381d52fb407feac1b4c13bf5034b30726abcf17fb9b7695c188be0a6f9056aa3525d11d8e7679cd68b616a542b4d28
-
SSDEEP
6144:FL5L00kAaEGd9ZXDDHP4Kv9JAASWX37/Gv7VPCtC4XUPoB6trJ5k8MOWqjdq:j7kATGd9ZTDHwKvXF4EtC4gqKJWmWmdq
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-