General

  • Target

    c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24

  • Size

    209KB

  • Sample

    221204-lndemsbf9s

  • MD5

    cb2dfa596bd16023462059c08021788d

  • SHA1

    eb336af31ff94d77268b5f6c2ddb32bd2c613e9f

  • SHA256

    c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24

  • SHA512

    d82af7d189937904a7d79487e2579af3e2786f5e8afb4f4eed599ee1ade68f3f3a371232f4b4b3c9c352c6641b6628b1cc560f161bd8a84c026f6741b4fee039

  • SSDEEP

    3072:WChJgYMm4xf9cU9KQ2BxA59SPMGOojn2lF:GYMm4xiWKQ2BiCM/

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24

    • Size

      209KB

    • MD5

      cb2dfa596bd16023462059c08021788d

    • SHA1

      eb336af31ff94d77268b5f6c2ddb32bd2c613e9f

    • SHA256

      c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24

    • SHA512

      d82af7d189937904a7d79487e2579af3e2786f5e8afb4f4eed599ee1ade68f3f3a371232f4b4b3c9c352c6641b6628b1cc560f161bd8a84c026f6741b4fee039

    • SSDEEP

      3072:WChJgYMm4xf9cU9KQ2BxA59SPMGOojn2lF:GYMm4xiWKQ2BiCM/

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks