General

  • Target

    8c098256886fb84a6705b40f13f41387105cb2d9c42fbc2744ec575bbf061489

  • Size

    26KB

  • Sample

    221026-rfrj7agacm

  • MD5

    e30f3dfbfb26922877895a18b9e7b3ba

  • SHA1

    27a09ed765c0816965f3e978de03d68cd0529386

  • SHA256

    8c098256886fb84a6705b40f13f41387105cb2d9c42fbc2744ec575bbf061489

  • SHA512

    c550942d1d65c19953afc7aa7a53e9756f1de53f2c79e14d825d33ffee8ca76476354e65b65f5f532280ba4bc13e55e9bf6f89ed50dc22b3daad33be1bdbc445

  • SSDEEP

    768:NRGuY2P0Vo6r7SiAwyrMRjbr57H6fK5pnbcuyD7U:DPcVo6r7S/rabr5GCPnouy8

Score
8/10
upx

Malware Config

Targets

    • Target

      8c098256886fb84a6705b40f13f41387105cb2d9c42fbc2744ec575bbf061489

    • Size

      26KB

    • MD5

      e30f3dfbfb26922877895a18b9e7b3ba

    • SHA1

      27a09ed765c0816965f3e978de03d68cd0529386

    • SHA256

      8c098256886fb84a6705b40f13f41387105cb2d9c42fbc2744ec575bbf061489

    • SHA512

      c550942d1d65c19953afc7aa7a53e9756f1de53f2c79e14d825d33ffee8ca76476354e65b65f5f532280ba4bc13e55e9bf6f89ed50dc22b3daad33be1bdbc445

    • SSDEEP

      768:NRGuY2P0Vo6r7SiAwyrMRjbr57H6fK5pnbcuyD7U:DPcVo6r7S/rabr5GCPnouy8

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

2
T1082

Tasks