General

  • Target

    ac9db121f9bffe93135fc8409d427bb1d555430cad35db2dcc37af0477d95e6f

  • Size

    1.7MB

  • Sample

    221130-sflvdaag97

  • MD5

    be05248b4cb0985b2c65804f548db8d3

  • SHA1

    bdd6009bcf09fb52d8ec2664a48dfb3d5e90d988

  • SHA256

    ac9db121f9bffe93135fc8409d427bb1d555430cad35db2dcc37af0477d95e6f

  • SHA512

    d6334fcf4db525e018040ec839163f9b330885746ae52935e4269b43602a3ec1f37ad274014c6d1f09d2c05140677150135526ae677a2b25f879a903f8c994bd

  • SSDEEP

    24576:FxBZxrdKk7Siu3mcZVTVkoHYxiJDo5eantrwHsD8Xw2ugSG9EkCu1vDewil4Ml5l:HhdKJBZVT+f35RdI3vEkZpDe7OMB

Score
10/10

Malware Config

Targets

    • Target

      ac9db121f9bffe93135fc8409d427bb1d555430cad35db2dcc37af0477d95e6f

    • Size

      1.7MB

    • MD5

      be05248b4cb0985b2c65804f548db8d3

    • SHA1

      bdd6009bcf09fb52d8ec2664a48dfb3d5e90d988

    • SHA256

      ac9db121f9bffe93135fc8409d427bb1d555430cad35db2dcc37af0477d95e6f

    • SHA512

      d6334fcf4db525e018040ec839163f9b330885746ae52935e4269b43602a3ec1f37ad274014c6d1f09d2c05140677150135526ae677a2b25f879a903f8c994bd

    • SSDEEP

      24576:FxBZxrdKk7Siu3mcZVTVkoHYxiJDo5eantrwHsD8Xw2ugSG9EkCu1vDewil4Ml5l:HhdKJBZVT+f35RdI3vEkZpDe7OMB

    Score
    10/10
    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Connection Proxy

1
T1090

Tasks