General

  • Target

    fe49c5d18165c52674962d40149be194cbd2c373f130de73b6e98fd9dc536908

  • Size

    255KB

  • Sample

    221123-lztk1aga9z

  • MD5

    44c9807aa44621e88c03a0942a434030

  • SHA1

    e29314c86afe3d59bb86b09a537f8113cc98d553

  • SHA256

    fe49c5d18165c52674962d40149be194cbd2c373f130de73b6e98fd9dc536908

  • SHA512

    59b4988563ac7f5170253771610a70b349bb7ed50f4523d337441ee083623c2018ccc787f966a7aa88d8464125d476f664d2773864d25d63cf3ef250550d64d8

  • SSDEEP

    6144:8nhGHSKB6XHABgukwVEfXym375ZtSZXiu04:8nhNDa

Score
8/10

Malware Config

Targets

    • Target

      fe49c5d18165c52674962d40149be194cbd2c373f130de73b6e98fd9dc536908

    • Size

      255KB

    • MD5

      44c9807aa44621e88c03a0942a434030

    • SHA1

      e29314c86afe3d59bb86b09a537f8113cc98d553

    • SHA256

      fe49c5d18165c52674962d40149be194cbd2c373f130de73b6e98fd9dc536908

    • SHA512

      59b4988563ac7f5170253771610a70b349bb7ed50f4523d337441ee083623c2018ccc787f966a7aa88d8464125d476f664d2773864d25d63cf3ef250550d64d8

    • SSDEEP

      6144:8nhGHSKB6XHABgukwVEfXym375ZtSZXiu04:8nhNDa

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks