General

  • Target

    c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237

  • Size

    268KB

  • Sample

    221202-behynaha72

  • MD5

    79ca88d619518f16322ac422702c1343

  • SHA1

    49bd4ba82e8a756beda318a810aa88e1551dfc37

  • SHA256

    c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237

  • SHA512

    cc0c32ad5dda91360865530ef6d952367f64319ec26f05b96c2ce4d22c1e810cb658a737b85933e483399aa71e693aeadbd06b4d8f9b3f5c265cb48d2832e123

  • SSDEEP

    3072:EVHgCc4xGvbwcU9KQ2BBAHmaPxNVoOb5Eu:RCc4xGxWKQ2Bonxh

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Targets

    • Target

      c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237

    • Size

      268KB

    • MD5

      79ca88d619518f16322ac422702c1343

    • SHA1

      49bd4ba82e8a756beda318a810aa88e1551dfc37

    • SHA256

      c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237

    • SHA512

      cc0c32ad5dda91360865530ef6d952367f64319ec26f05b96c2ce4d22c1e810cb658a737b85933e483399aa71e693aeadbd06b4d8f9b3f5c265cb48d2832e123

    • SSDEEP

      3072:EVHgCc4xGvbwcU9KQ2BBAHmaPxNVoOb5Eu:RCc4xGxWKQ2Bonxh

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks