General

  • Target

    c124c69360c2dbf5e147d91dff11ac5717eef894bc2ccacf419aa5977603f2d8

  • Size

    189KB

  • Sample

    221030-zcsl3sagam

  • MD5

    90c9cef61c766c9a9f3a0f304a5b9590

  • SHA1

    3a009b11b162a39d30f58529a0cd60544bcb3d2a

  • SHA256

    c124c69360c2dbf5e147d91dff11ac5717eef894bc2ccacf419aa5977603f2d8

  • SHA512

    b2e1469d1bf01a558fe0881efee4512988bb4ad2165c822dc2dedd0d47a6a0d445489246ea5e5c18a5ca284085555a5c6c3171691c63897229127666eaa662e6

  • SSDEEP

    1536:SvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjrSrowugo:SvVQLIkLWeaA8KlCph9Growugo

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      c124c69360c2dbf5e147d91dff11ac5717eef894bc2ccacf419aa5977603f2d8

    • Size

      189KB

    • MD5

      90c9cef61c766c9a9f3a0f304a5b9590

    • SHA1

      3a009b11b162a39d30f58529a0cd60544bcb3d2a

    • SHA256

      c124c69360c2dbf5e147d91dff11ac5717eef894bc2ccacf419aa5977603f2d8

    • SHA512

      b2e1469d1bf01a558fe0881efee4512988bb4ad2165c822dc2dedd0d47a6a0d445489246ea5e5c18a5ca284085555a5c6c3171691c63897229127666eaa662e6

    • SSDEEP

      1536:SvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjrSrowugo:SvVQLIkLWeaA8KlCph9Growugo

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks