General

  • Target

    chuaname.exe

  • Size

    157KB

  • Sample

    230630-xt8craed43

  • MD5

    5767ca40c29cb20842c8d3b12c93d582

  • SHA1

    8fe5bcd90416a48b3f862ea52f726239d2d8efc3

  • SHA256

    a14f448e7fbeed5aee2f0db602bca444bb821e731452e0e43f914b1cd902fec5

  • SHA512

    9c6fd9ffb1b0ea6305c4ed893923aa2e21ccaa63797b36458dc63eabd84e01cbc6b3331d808b58c79ae74122ee841872ab1e12683f8065ba0f40042f7f8b6321

  • SSDEEP

    3072:s2A2+ClsFxK7hfi5ji+8T26z02mNt4H96u:/AbZFx4h2uaew4Hn

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.54.95.217
  • Port:
    21
  • Username:
    123
  • Password:
    123

Targets

    • Target

      chuaname.exe

    • Size

      157KB

    • MD5

      5767ca40c29cb20842c8d3b12c93d582

    • SHA1

      8fe5bcd90416a48b3f862ea52f726239d2d8efc3

    • SHA256

      a14f448e7fbeed5aee2f0db602bca444bb821e731452e0e43f914b1cd902fec5

    • SHA512

      9c6fd9ffb1b0ea6305c4ed893923aa2e21ccaa63797b36458dc63eabd84e01cbc6b3331d808b58c79ae74122ee841872ab1e12683f8065ba0f40042f7f8b6321

    • SSDEEP

      3072:s2A2+ClsFxK7hfi5ji+8T26z02mNt4H96u:/AbZFx4h2uaew4Hn

    Score
    10/10
    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks