General

  • Target

    ccfb464feac36f66017500e1a3fa632a9e41658d18fb1a97a5b41cdbc1cac055

  • Size

    208KB

  • Sample

    221124-axq7baag7t

  • MD5

    32fbc3d203fef6345a8963d60c216cd0

  • SHA1

    3ca4786b9af5efae74b5fcb435c712d448f5bf74

  • SHA256

    ccfb464feac36f66017500e1a3fa632a9e41658d18fb1a97a5b41cdbc1cac055

  • SHA512

    a73beb496a96d329a3384a75fd7181b16a31af74a42cdcd62cba9c6411419f3d99c657aa7034c6d084997d18171da154bfd263565857a6be50d7ba661f889a53

  • SSDEEP

    3072:JVHgCc4xGvbwcU9KQ2BBAHmaPxiVoSb5E2:MCc4xGxWKQ2Bonxw

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      ccfb464feac36f66017500e1a3fa632a9e41658d18fb1a97a5b41cdbc1cac055

    • Size

      208KB

    • MD5

      32fbc3d203fef6345a8963d60c216cd0

    • SHA1

      3ca4786b9af5efae74b5fcb435c712d448f5bf74

    • SHA256

      ccfb464feac36f66017500e1a3fa632a9e41658d18fb1a97a5b41cdbc1cac055

    • SHA512

      a73beb496a96d329a3384a75fd7181b16a31af74a42cdcd62cba9c6411419f3d99c657aa7034c6d084997d18171da154bfd263565857a6be50d7ba661f889a53

    • SSDEEP

      3072:JVHgCc4xGvbwcU9KQ2BBAHmaPxiVoSb5E2:MCc4xGxWKQ2Bonxw

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks