General

  • Target

    LoaderV2.exe

  • Size

    20.6MB

  • Sample

    230605-xj1vxsag8y

  • MD5

    e59e70a831b42bf3ed68f2607c4fb756

  • SHA1

    c344a5e43f9063541aa2c4e5187d002e003d62a5

  • SHA256

    af59554f3f939ca62afe170d99c448070bf2abed35196d5cc27691d4d435da9b

  • SHA512

    e473edca8bba2f668a041f6218d28cbeac2d7f1e95e9f800f76ab45a30dfdd08eb163aae334f601c492b0a032a051fdf41cee41196cca7a4f5c234293b5ff734

  • SSDEEP

    393216:pqPnLFXlrU/3KiMuQpDOETgsvfGX3g0LYaCJ6ZjVb6vNT2eUKH5E:gPLFXNUSGQoE2RLB7NuZHU2

Score
7/10

Malware Config

Targets

    • Target

      LoaderV2.exe

    • Size

      20.6MB

    • MD5

      e59e70a831b42bf3ed68f2607c4fb756

    • SHA1

      c344a5e43f9063541aa2c4e5187d002e003d62a5

    • SHA256

      af59554f3f939ca62afe170d99c448070bf2abed35196d5cc27691d4d435da9b

    • SHA512

      e473edca8bba2f668a041f6218d28cbeac2d7f1e95e9f800f76ab45a30dfdd08eb163aae334f601c492b0a032a051fdf41cee41196cca7a4f5c234293b5ff734

    • SSDEEP

      393216:pqPnLFXlrU/3KiMuQpDOETgsvfGX3g0LYaCJ6ZjVb6vNT2eUKH5E:gPLFXNUSGQoE2RLB7NuZHU2

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks