General

  • Target

    Drone2.exe

  • Size

    10.8MB

  • Sample

    221004-x552rscebq

  • MD5

    628fb9697b51b755592a291e0aa84dbc

  • SHA1

    1c92bf9a29838e85ed0f536dd9c60414fb06b4bd

  • SHA256

    a777e2b598837cbbeb3685dd9f00430fc88d65ffcc8734b6a078296c7ec070a5

  • SHA512

    b69a09ab528dd7b9f83685be3f68f829a08c19ff00602115ba49c4340ead32ad9fb0ae0930a1fb117bfa3dd3ece7b298037c270b6dc063c8e81ff172ed5d0839

  • SSDEEP

    196608:PdcUpbDO6DjzpLRUZtO0oAinb4wqJf0W8/Lae+977S/s5Fpj0X9DcCuQ:dpb3dCEb4wqJcW83k7G0Pp8iJ

Score
8/10

Malware Config

Targets

    • Target

      Drone2.exe

    • Size

      10.8MB

    • MD5

      628fb9697b51b755592a291e0aa84dbc

    • SHA1

      1c92bf9a29838e85ed0f536dd9c60414fb06b4bd

    • SHA256

      a777e2b598837cbbeb3685dd9f00430fc88d65ffcc8734b6a078296c7ec070a5

    • SHA512

      b69a09ab528dd7b9f83685be3f68f829a08c19ff00602115ba49c4340ead32ad9fb0ae0930a1fb117bfa3dd3ece7b298037c270b6dc063c8e81ff172ed5d0839

    • SSDEEP

      196608:PdcUpbDO6DjzpLRUZtO0oAinb4wqJf0W8/Lae+977S/s5Fpj0X9DcCuQ:dpb3dCEb4wqJcW83k7G0Pp8iJ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks