Resubmissions

27-08-2023 01:24

230827-bsr4gseg44 10

27-08-2023 01:22

230827-brerrseg42 10

General

  • Target

    instalator2.rar

  • Size

    17.4MB

  • Sample

    230827-bsr4gseg44

  • MD5

    b704798d9010244cda1a33f04cb9b1a0

  • SHA1

    55fbc44ddf9df53a0ddca41be8f52994bf8b8008

  • SHA256

    444580922572f39db38506e3c9a734cacd69db9af70bc8cdc93ee4af53672b05

  • SHA512

    a08353c7beff302c7759bd045ff12af68219bc704d6251ecb99220c7c5eda9a9b7b5d5ae7e29fb8cd6bc2638ce00e86941c8c71fe4ed992897c92900a135364f

  • SSDEEP

    393216:lfznWtPPIyH+QPDsbJmJ8VRZiDoZzMycDhQm3bFlSU/g+EenP3h1C:lqBAyeQPCMGVR4Dhxlt/g+LnPnC

Malware Config

Targets

    • Target

      cheaty.exe

    • Size

      17.6MB

    • MD5

      c3563a5377d2a69a5a92fd429934cdcb

    • SHA1

      aa9a23316b9db783ab2f2a564d1412e8ef2c1576

    • SHA256

      86744756dce9d51666bf2b30980a5da886c469eeb764831068c988b73c3942d0

    • SHA512

      c05898862ed332096b1b2fc018558ac70037f49ad52afc6ed296b930bf293563c9540daad4de17a030f670adaeca3edf3ff17be4d3b7c1a0303663d2b50c6ad5

    • SSDEEP

      393216:SqPnLFXlrPUgQpDOETgsvfGJgkUVJmvE1r2JLy:XPLFXNPtQoEqXUf/Qt

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks