General

  • Target

    clicker.exe

  • Size

    20.6MB

  • Sample

    230205-q7cpnsdb2z

  • MD5

    b9fcf9bfa8e76112e8ea6a706474210d

  • SHA1

    4ca6b5dfd2cd2f16eeb358571a5834f42e2950f7

  • SHA256

    05e1a1b887920a77f7473712f186764cb856c3daa03c8d7d34f9eca35a1e81b3

  • SHA512

    67253b77179833bf20c17aac0201ccc32793910eb883e032f9602d5c76f83bee549bfae2e105939de765f5b72bbb95607a4809496994b30f8d7e16a2dd246bc4

  • SSDEEP

    393216:7AlnGYXpSQRb6NX/m3prlrW8/K1D2NJ/2d8N:UlGYXpS8eNXKZCP2Dx

Score
7/10

Malware Config

Targets

    • Target

      clicker.exe

    • Size

      20.6MB

    • MD5

      b9fcf9bfa8e76112e8ea6a706474210d

    • SHA1

      4ca6b5dfd2cd2f16eeb358571a5834f42e2950f7

    • SHA256

      05e1a1b887920a77f7473712f186764cb856c3daa03c8d7d34f9eca35a1e81b3

    • SHA512

      67253b77179833bf20c17aac0201ccc32793910eb883e032f9602d5c76f83bee549bfae2e105939de765f5b72bbb95607a4809496994b30f8d7e16a2dd246bc4

    • SSDEEP

      393216:7AlnGYXpSQRb6NX/m3prlrW8/K1D2NJ/2d8N:UlGYXpS8eNXKZCP2Dx

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks