General

  • Target

    Drone2.exe

  • Size

    10.8MB

  • Sample

    221004-xvlkdabhe6

  • MD5

    52da46cccf2bdeb72713a8761cee181e

  • SHA1

    f795a60c9f7990bdb6a71812216f8f26910f7873

  • SHA256

    ea8fb55e3bb1ca7f17b4d50a64f51c62fdd09106423e3aa25dcfd19be8adb86c

  • SHA512

    d05dc726060559ff03b261f03f99b88ca4645d51b975b80ee5bfbc0f2268f5d0ef6abae4af3457229400399d8bc56a10913269c9e8465002086101c8118a01f2

  • SSDEEP

    196608:LCzUpbDO6DjzpLRUZtO0oAinb4Q0Jf0W8/La/+Z77S/s5FpjJX9DVCVt:tpb3dCEb4rJcW8WE7G0Pph3u

Score
8/10

Malware Config

Targets

    • Target

      Drone2.exe

    • Size

      10.8MB

    • MD5

      52da46cccf2bdeb72713a8761cee181e

    • SHA1

      f795a60c9f7990bdb6a71812216f8f26910f7873

    • SHA256

      ea8fb55e3bb1ca7f17b4d50a64f51c62fdd09106423e3aa25dcfd19be8adb86c

    • SHA512

      d05dc726060559ff03b261f03f99b88ca4645d51b975b80ee5bfbc0f2268f5d0ef6abae4af3457229400399d8bc56a10913269c9e8465002086101c8118a01f2

    • SSDEEP

      196608:LCzUpbDO6DjzpLRUZtO0oAinb4Q0Jf0W8/La/+Z77S/s5FpjJX9DVCVt:tpb3dCEb4rJcW8WE7G0Pph3u

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks