General

  • Target

    solaris_public.exe

  • Size

    23.8MB

  • Sample

    230823-1jgc3ahb51

  • MD5

    9e9b9b0293324a72d37ad92eb60dd63c

  • SHA1

    4d5a5b79566a7510cd6dc2484adf0219e7a79d48

  • SHA256

    9b18317db72f974fe7930a1e1f1fcac7c396708436d7544acb58bfd74b9215b1

  • SHA512

    f31c36102db803c7b39646920acd5b2534158df52c2cabd7a369309c8be2c537532d9506b662bd64e97280220a726ede9579a9f2627b5af0580ee73c27a3a8a4

  • SSDEEP

    393216:Uh3nJWQDj8oLOPhWbTlZ3S1bV4Oqe26YlXzdCydZ6:Uh3EQv8yuhElZWRPWP7

Score
7/10

Malware Config

Targets

    • Target

      solaris_public.exe

    • Size

      23.8MB

    • MD5

      9e9b9b0293324a72d37ad92eb60dd63c

    • SHA1

      4d5a5b79566a7510cd6dc2484adf0219e7a79d48

    • SHA256

      9b18317db72f974fe7930a1e1f1fcac7c396708436d7544acb58bfd74b9215b1

    • SHA512

      f31c36102db803c7b39646920acd5b2534158df52c2cabd7a369309c8be2c537532d9506b662bd64e97280220a726ede9579a9f2627b5af0580ee73c27a3a8a4

    • SSDEEP

      393216:Uh3nJWQDj8oLOPhWbTlZ3S1bV4Oqe26YlXzdCydZ6:Uh3EQv8yuhElZWRPWP7

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks