General

  • Target

    Drone2.exe

  • Size

    10.8MB

  • Sample

    221004-x1b8wsccfp

  • MD5

    96027989db836172009071018b185674

  • SHA1

    71633c559d5038196a9d9ab8a6342d578317547d

  • SHA256

    177045902c1e7c9c6fccbb453394a53a7568a0bffb060e6fdd12b8fb2d92946c

  • SHA512

    f2f9dbd5099b2e0b8e764ba45fa8484457845a7c80a2724193c420abe10794e37f505982ebe37466cc27fdc643e98e4897f94483accdc767f2afd79930024824

  • SSDEEP

    196608:XUiUpbDO6DjzpLRUZtO0oAinb4vJf0W8/LaK+177SKs5FpjIX9DcCuy:Qpb3dCEb4vJcW8bS7G7PpYiJ

Score
8/10

Malware Config

Targets

    • Target

      Drone2.exe

    • Size

      10.8MB

    • MD5

      96027989db836172009071018b185674

    • SHA1

      71633c559d5038196a9d9ab8a6342d578317547d

    • SHA256

      177045902c1e7c9c6fccbb453394a53a7568a0bffb060e6fdd12b8fb2d92946c

    • SHA512

      f2f9dbd5099b2e0b8e764ba45fa8484457845a7c80a2724193c420abe10794e37f505982ebe37466cc27fdc643e98e4897f94483accdc767f2afd79930024824

    • SSDEEP

      196608:XUiUpbDO6DjzpLRUZtO0oAinb4vJf0W8/LaK+177SKs5FpjIX9DcCuy:Qpb3dCEb4vJcW8bS7G7PpYiJ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks