General

  • Target

    fea4879b4f83f34aa82afc3cece6ce2293088566307a872970a1c9bdaa3d00d7

  • Size

    208KB

  • Sample

    221205-m82hmsgh5y

  • MD5

    743acdb8356f6b3e3d434fcaf5f2bb6d

  • SHA1

    1a324699b64a050bc6d14e99da5f7fe000411136

  • SHA256

    fea4879b4f83f34aa82afc3cece6ce2293088566307a872970a1c9bdaa3d00d7

  • SHA512

    7464f0bc4f3a476305b29a5a767c5135042dff1f131c73d520f82e43ec46e294ea28e2f8d79711be9a6ac979d73148a6f6e2bb6edca0f8d39b03d2a2de775039

  • SSDEEP

    3072:FVHgCc4xGvbwcU9KQ2BBAHmaPxlVosb5E:YCc4xGxWKQ2Bonx

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      fea4879b4f83f34aa82afc3cece6ce2293088566307a872970a1c9bdaa3d00d7

    • Size

      208KB

    • MD5

      743acdb8356f6b3e3d434fcaf5f2bb6d

    • SHA1

      1a324699b64a050bc6d14e99da5f7fe000411136

    • SHA256

      fea4879b4f83f34aa82afc3cece6ce2293088566307a872970a1c9bdaa3d00d7

    • SHA512

      7464f0bc4f3a476305b29a5a767c5135042dff1f131c73d520f82e43ec46e294ea28e2f8d79711be9a6ac979d73148a6f6e2bb6edca0f8d39b03d2a2de775039

    • SSDEEP

      3072:FVHgCc4xGvbwcU9KQ2BBAHmaPxlVosb5E:YCc4xGxWKQ2Bonx

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks