General

  • Target

    c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1

  • Size

    208KB

  • Sample

    221205-m9afjsdc49

  • MD5

    c29f0b3d235892c195241551219d01cf

  • SHA1

    9f16575d38a8bb17733aa5e7acf5cac2d8f1cf0f

  • SHA256

    c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1

  • SHA512

    4e45fad57a0c56a88d481ca1de8cc1e87be22de293be4b8fb90a47a868881d1a471a112f9d9858ad0fdbe073aedfedc5e7ced04295842ec4122823d15d815188

  • SSDEEP

    3072:nVHgCc4xGvbwcU9KQ2BBAHmaPxvVoqb5ET:OCc4xGxWKQ2Bonxc

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1

    • Size

      208KB

    • MD5

      c29f0b3d235892c195241551219d01cf

    • SHA1

      9f16575d38a8bb17733aa5e7acf5cac2d8f1cf0f

    • SHA256

      c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1

    • SHA512

      4e45fad57a0c56a88d481ca1de8cc1e87be22de293be4b8fb90a47a868881d1a471a112f9d9858ad0fdbe073aedfedc5e7ced04295842ec4122823d15d815188

    • SSDEEP

      3072:nVHgCc4xGvbwcU9KQ2BBAHmaPxvVoqb5ET:OCc4xGxWKQ2Bonxc

    Score
    10/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks