General

  • Target

    samples (1).zip

  • Size

    17.5MB

  • Sample

    230603-fned2sfe92

  • MD5

    1b2b808d94372eb320e195b5df9ac6da

  • SHA1

    ac94702efd7b8d32cbf6a0407b45b41b88832626

  • SHA256

    ce3147c582ec08416adfdd23d2eca84db57d7d30671d86f3bc17b436082f3246

  • SHA512

    1a48df59286bb4314710c220d274756a9ed162f36c29e0881271023d1fc0fa3c1fe6a28babc48837d1b2dc25447e00a601677cce59dcc2215e57241ca3c2794f

  • SSDEEP

    393216:wtIAbFO60UzP6YHxmhjSuwKtc7jvvGVCLEyBlAS1f:6I+FOHul7uXtSjvym11

Score
7/10

Malware Config

Targets

    • Target

      c9b324bc6601f267cbe474764ecf6b1e9b6b739b31f8e5c3ab1acb930aa1d145

    • Size

      17.7MB

    • MD5

      97a5ad8694bb1f3a60fdd2c2c76a1f2e

    • SHA1

      fce884bf6edd583f5f350553ccc6251b32835355

    • SHA256

      c9b324bc6601f267cbe474764ecf6b1e9b6b739b31f8e5c3ab1acb930aa1d145

    • SHA512

      4ba7bfec516fc18f02823c29b4b56bd29576974499730dc976c9f7707ddd545f94cab7aca6d2d7fc2c17d4f6e95bcf6ccb176617158f198b6b5d88a7b274c951

    • SSDEEP

      393216:SqPnLFXlrjQpDOETgsvfG5gjImvE7jdhqLi:XPLFXNjQoECmI/lO

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks