General

  • Target

    main.exe

  • Size

    18.0MB

  • Sample

    230605-z3676aah35

  • MD5

    54fbf65136d91612fc75e6d814e2073d

  • SHA1

    0698b98e7678a4daa8e0de81965239244342d3d3

  • SHA256

    7a691e548951b8d8b9b77dcc814a0d1f891e8442f6c417791b9bb75a05020c47

  • SHA512

    7307bd69d515b3eb755ce3e0f62e9f12ce22c651aec08d999f755cbf34b65fd99b72ec7dfb80f4f48d9f6ede7e525b992ef99485eab83f8cab7c505a36187683

  • SSDEEP

    393216:aqPnLFXl4pHdTQ9bAlbRu3oNGV9Ngg78hhomqo7oNc9ynr+N:vPLFXivQ9bO43NbNMnGp

Score
7/10

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.0MB

    • MD5

      54fbf65136d91612fc75e6d814e2073d

    • SHA1

      0698b98e7678a4daa8e0de81965239244342d3d3

    • SHA256

      7a691e548951b8d8b9b77dcc814a0d1f891e8442f6c417791b9bb75a05020c47

    • SHA512

      7307bd69d515b3eb755ce3e0f62e9f12ce22c651aec08d999f755cbf34b65fd99b72ec7dfb80f4f48d9f6ede7e525b992ef99485eab83f8cab7c505a36187683

    • SSDEEP

      393216:aqPnLFXl4pHdTQ9bAlbRu3oNGV9Ngg78hhomqo7oNc9ynr+N:vPLFXivQ9bO43NbNMnGp

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks