General

  • Target

    Amazon-AIO-v1.5-main.zip

  • Size

    18.7MB

  • Sample

    230213-zrvd8aff51

  • MD5

    aab1cc4773754e42c56d443f1ba8872e

  • SHA1

    21bf42d61dfd9f694a66da0a3b222bf5fed0859b

  • SHA256

    1b2a79a477684651c048f88f00b38f07309337b15628f17e7ffa88713d7d903b

  • SHA512

    87a78189a819c3783f4ff5397f9da042059d7c8e035f5acf004a5ff27e98e2d44d53ce9744d3a1ab5ddb17318200f4a9a21e4e5531a6117bafd351227156c03e

  • SSDEEP

    393216:DcSQZ4tpsQGY/MyVI2VhwC7d5Rm7VhxH/e5cLNHm15Pd6waWJWc:2+L/MyVVVo5feaNHWv6Kv

Score
7/10

Malware Config

Targets

    • Target

      Amazon AIO v1.5/Amazon_AIO.exe

    • Size

      19.1MB

    • MD5

      6296d38ef79c79ff7f0c7b963e146e5e

    • SHA1

      7d3af9e62d90f80a391be5b728fe79aa2b7f6812

    • SHA256

      58e9c048f307c8ef2a5b3a85ee288a2411002dd443b2c32f55df1521f33f1212

    • SHA512

      f4b8f616ac62078943336428869ab9dec4b103cbf25f1e60b0d3bb07db7f76d325dcbe1e26a456a3f8691b958740993cb18e56dcffb5299779e1346d976a89dc

    • SSDEEP

      393216:nxAlniYXPziqT6KP/m3pRwBw8mYJdnd9n:+liYXPzJWKPKua6T

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks