General

  • Target

    acecb6b732c0ec99ebca0ef508ee398f9c50eba5d29558df06d496994c1001ec

  • Size

    209KB

  • Sample

    221124-axs1xafe82

  • MD5

    513175e6e8d8c0bcd42d8b55d5114b80

  • SHA1

    bafcf71ab9b09745bd76b7526da99890111e48c3

  • SHA256

    acecb6b732c0ec99ebca0ef508ee398f9c50eba5d29558df06d496994c1001ec

  • SHA512

    52ed4c9a55375f6ba8be60ba52461638b1866e2f87a4b076cbbe47860d2b599efc8c18c1251c296138d0c0840b1f346d62139fc207794fa22b2b2c7efc6904cc

  • SSDEEP

    1536:kwQBHvoYUWjzlZLXf4QJpUT0mSBAgapetc8o/Kdgo4QGuG3g5r:kBlvaWjzrLXQQJKgmSBAVpet2Ago4lu

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      acecb6b732c0ec99ebca0ef508ee398f9c50eba5d29558df06d496994c1001ec

    • Size

      209KB

    • MD5

      513175e6e8d8c0bcd42d8b55d5114b80

    • SHA1

      bafcf71ab9b09745bd76b7526da99890111e48c3

    • SHA256

      acecb6b732c0ec99ebca0ef508ee398f9c50eba5d29558df06d496994c1001ec

    • SHA512

      52ed4c9a55375f6ba8be60ba52461638b1866e2f87a4b076cbbe47860d2b599efc8c18c1251c296138d0c0840b1f346d62139fc207794fa22b2b2c7efc6904cc

    • SSDEEP

      1536:kwQBHvoYUWjzlZLXf4QJpUT0mSBAgapetc8o/Kdgo4QGuG3g5r:kBlvaWjzrLXQQJKgmSBAVpet2Ago4lu

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks