General

  • Target

    e75a0249e9ae701c29eb4eef967ad239f3ea381444614ef7272e0f74b364d5c6

  • Size

    291KB

  • Sample

    221124-em9ywsga73

  • MD5

    abeba866077bdbaa55274f2dcf38089c

  • SHA1

    9bac76a2d80558fe1741ad8e238c67e9f4171c3c

  • SHA256

    e75a0249e9ae701c29eb4eef967ad239f3ea381444614ef7272e0f74b364d5c6

  • SHA512

    8c35a437eee074d5ee08509ddac32cc47a601406e15b90eff3d041e7e20a623ed7b3281644425f02c774d734e0406befeb6142d65225b5bed58f655c0e69675c

  • SSDEEP

    3072:2ePgCctxGv4QcU9KQ2BBA2waPxYtmoldEgnROnZvyExl2F+yobm:yCctxGsWKQ2Bx5xgJEHnByExl2F+m

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      e75a0249e9ae701c29eb4eef967ad239f3ea381444614ef7272e0f74b364d5c6

    • Size

      291KB

    • MD5

      abeba866077bdbaa55274f2dcf38089c

    • SHA1

      9bac76a2d80558fe1741ad8e238c67e9f4171c3c

    • SHA256

      e75a0249e9ae701c29eb4eef967ad239f3ea381444614ef7272e0f74b364d5c6

    • SHA512

      8c35a437eee074d5ee08509ddac32cc47a601406e15b90eff3d041e7e20a623ed7b3281644425f02c774d734e0406befeb6142d65225b5bed58f655c0e69675c

    • SSDEEP

      3072:2ePgCctxGv4QcU9KQ2BBA2waPxYtmoldEgnROnZvyExl2F+yobm:yCctxGsWKQ2Bx5xgJEHnByExl2F+m

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks