General

  • Target

    ea88e33a2214002f72f7685e791293de51a4725a93f75642e6f2ebf2947fb51b

  • Size

    989KB

  • Sample

    221204-mk1lfaag76

  • MD5

    efb9d9e47526ba3c266ba33ec2fc37e2

  • SHA1

    04e98a98668f1932b89d646073c52b167fbe6310

  • SHA256

    ea88e33a2214002f72f7685e791293de51a4725a93f75642e6f2ebf2947fb51b

  • SHA512

    bdf222b2a593251a4cf9847e234064019155bc7de76853b45b7ea34aa51b1ebff7b693bdbf90002b1b3d4c63d29fd23122251dc6516d8b1590bcb1b05084d05f

  • SSDEEP

    24576:mL10fZbynemp1x7IDF1SHT4fmM/9J7ujGNLqWQp:s3nlkK0fNDCCNO

Score
10/10
upx

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    almob545.aiq.ru
  • Port:
    21
  • Username:
    u336070
  • Password:
    cejcc4qk

Targets

    • Target

      ea88e33a2214002f72f7685e791293de51a4725a93f75642e6f2ebf2947fb51b

    • Size

      989KB

    • MD5

      efb9d9e47526ba3c266ba33ec2fc37e2

    • SHA1

      04e98a98668f1932b89d646073c52b167fbe6310

    • SHA256

      ea88e33a2214002f72f7685e791293de51a4725a93f75642e6f2ebf2947fb51b

    • SHA512

      bdf222b2a593251a4cf9847e234064019155bc7de76853b45b7ea34aa51b1ebff7b693bdbf90002b1b3d4c63d29fd23122251dc6516d8b1590bcb1b05084d05f

    • SSDEEP

      24576:mL10fZbynemp1x7IDF1SHT4fmM/9J7ujGNLqWQp:s3nlkK0fNDCCNO

    Score
    10/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks