General

  • Target

    c219e61d60bfd68b452f62dc0754e73570db1743c770bc6bc1f9c1d66207d04f

  • Size

    1.3MB

  • Sample

    230830-fer9jshg65

  • MD5

    7b9e51830ca279f231efe1aea149c607

  • SHA1

    8719690061691d5301927df5f9e4450f9872b2f6

  • SHA256

    c219e61d60bfd68b452f62dc0754e73570db1743c770bc6bc1f9c1d66207d04f

  • SHA512

    f1caa659ae970707069f5f82ea45e4f0923f73ab8b111137bc1471fe017bbe0762011653dc4a37ff6d6679a7c5c553a030b5a9f9da5677181912ba38c55e7271

  • SSDEEP

    24576:o80iztSjOYYELrf92tsedlF0dI5C0f7ggiGZduAEWFndCm6+EbE6PzFZ:j0izGOYYELrV2tsedlF0dI5C0f7ggiGI

Score
6/10

Malware Config

Targets

    • Target

      c219e61d60bfd68b452f62dc0754e73570db1743c770bc6bc1f9c1d66207d04f

    • Size

      1.3MB

    • MD5

      7b9e51830ca279f231efe1aea149c607

    • SHA1

      8719690061691d5301927df5f9e4450f9872b2f6

    • SHA256

      c219e61d60bfd68b452f62dc0754e73570db1743c770bc6bc1f9c1d66207d04f

    • SHA512

      f1caa659ae970707069f5f82ea45e4f0923f73ab8b111137bc1471fe017bbe0762011653dc4a37ff6d6679a7c5c553a030b5a9f9da5677181912ba38c55e7271

    • SSDEEP

      24576:o80iztSjOYYELrf92tsedlF0dI5C0f7ggiGZduAEWFndCm6+EbE6PzFZ:j0izGOYYELrV2tsedlF0dI5C0f7ggiGI

    Score
    6/10
    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks