General

  • Target

    main.exe

  • Size

    13.9MB

  • Sample

    230903-3lj8vada53

  • MD5

    db4801f350f32e49f20e81ddba0e91a6

  • SHA1

    31f40e96b9829a25d1b6197f94f90f872a477605

  • SHA256

    8d14350bfc8be918b5a0d74859036eb57030dd3b121df779b98343d7bd2a476a

  • SHA512

    ac5fabae00793a925c01dac6a1f85669a2cb2d8f4dd16b2c04ddb1dab395c05971b66217a2216b9a92dbd944622138d35325a0bb8b3e53cc6ee93234ca5af26f

  • SSDEEP

    196608:eZ/lOqPnih8FXj+hYeB0sKYu/PaQhKDnO8NpHzgsAGKaRZtG77CT05hrtqlKuiXj:BqPnLFCjQ8DOETgsv/GvkI6KDs0Mfk

Malware Config

Targets

    • Target

      main.exe

    • Size

      13.9MB

    • MD5

      db4801f350f32e49f20e81ddba0e91a6

    • SHA1

      31f40e96b9829a25d1b6197f94f90f872a477605

    • SHA256

      8d14350bfc8be918b5a0d74859036eb57030dd3b121df779b98343d7bd2a476a

    • SHA512

      ac5fabae00793a925c01dac6a1f85669a2cb2d8f4dd16b2c04ddb1dab395c05971b66217a2216b9a92dbd944622138d35325a0bb8b3e53cc6ee93234ca5af26f

    • SSDEEP

      196608:eZ/lOqPnih8FXj+hYeB0sKYu/PaQhKDnO8NpHzgsAGKaRZtG77CT05hrtqlKuiXj:BqPnLFCjQ8DOETgsv/GvkI6KDs0Mfk

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks