General

  • Target

    9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877

  • Size

    143KB

  • Sample

    230605-yca7csba7s

  • MD5

    4dbe432b8c1bbe4b3a45f2b202c1781d

  • SHA1

    9aeae6ca0f74a0914316e3724bd485552211747b

  • SHA256

    9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877

  • SHA512

    9ca345c66b9ba91f8d73f6fab8beb460f8e5339c6d92a75f64e7ba450823efa5d255b95fbe26fb9bc51140de65e33988bc09ed5ab910dad082aad991181d0488

  • SSDEEP

    3072:1C7BOGKCXjYp8idHQbPRyZ2pP9EPgg0F:1GWCXdw8AZ2LEP

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.54.104.71
  • Port:
    21
  • Username:
    123
  • Password:
    123

Targets

    • Target

      9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877

    • Size

      143KB

    • MD5

      4dbe432b8c1bbe4b3a45f2b202c1781d

    • SHA1

      9aeae6ca0f74a0914316e3724bd485552211747b

    • SHA256

      9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877

    • SHA512

      9ca345c66b9ba91f8d73f6fab8beb460f8e5339c6d92a75f64e7ba450823efa5d255b95fbe26fb9bc51140de65e33988bc09ed5ab910dad082aad991181d0488

    • SSDEEP

      3072:1C7BOGKCXjYp8idHQbPRyZ2pP9EPgg0F:1GWCXdw8AZ2LEP

    Score
    10/10
    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks