General

  • Target

    Dronetry2.exe

  • Size

    10.8MB

  • Sample

    221002-y46scahcf6

  • MD5

    84dfd10181d9c86349f23712d746f3b6

  • SHA1

    8c8ec3d36051a4536419e1a690e88a8111e7c551

  • SHA256

    5e71f4be4f236894887d5a7fbfed9bdbbaf60b6ecfae58ced3300b4850a80d4c

  • SHA512

    99e267c9c2ba0e353b348015045d17e84fecd7156ae1d4f67fc48fcd24bfb79fbdeaedabf0a2226255de8daac9aabf6b8cc729c42fabf26d47bed3421df76d78

  • SSDEEP

    196608:rErUpbDO6DjzpLRUZtO0oAinb49Jf0W8/LapnL77SBs5FpjPX9D9Cux:dpb3dCEb49JcW8cL7GGPp7jJ

Score
8/10

Malware Config

Targets

    • Target

      Dronetry2.exe

    • Size

      10.8MB

    • MD5

      84dfd10181d9c86349f23712d746f3b6

    • SHA1

      8c8ec3d36051a4536419e1a690e88a8111e7c551

    • SHA256

      5e71f4be4f236894887d5a7fbfed9bdbbaf60b6ecfae58ced3300b4850a80d4c

    • SHA512

      99e267c9c2ba0e353b348015045d17e84fecd7156ae1d4f67fc48fcd24bfb79fbdeaedabf0a2226255de8daac9aabf6b8cc729c42fabf26d47bed3421df76d78

    • SSDEEP

      196608:rErUpbDO6DjzpLRUZtO0oAinb49Jf0W8/LapnL77SBs5FpjPX9D9Cux:dpb3dCEb49JcW8cL7GGPp7jJ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks