General

  • Target

    20spoofers.exe

  • Size

    23.6MB

  • Sample

    231005-nw9h6aag3w

  • MD5

    88b7c6e47eb8ae0c393bf96e97f999da

  • SHA1

    646c6127f90c678b4b030235ba79026ac6da2696

  • SHA256

    99a9c13184a57620005394cde5acafe8b6b8c2e3013fe61e1e83b9fa5d8e5a24

  • SHA512

    287a261765b67fbe8c692efd42e4eedcb20a8e92dc8f0db741ced8e442afdd1adfc8a58311b27a463f98d74c645b529d41a2055cdefa1c965e40bf72f46194c8

  • SSDEEP

    393216:CqPnLFXlrx2YfVdQuoBFDOETgsvcGCVg4VCE5DoplpI0GKyo/7r:HPLFXNxTPQuoBUEe7wE5IZry

Malware Config

Targets

    • Target

      20spoofers.exe

    • Size

      23.6MB

    • MD5

      88b7c6e47eb8ae0c393bf96e97f999da

    • SHA1

      646c6127f90c678b4b030235ba79026ac6da2696

    • SHA256

      99a9c13184a57620005394cde5acafe8b6b8c2e3013fe61e1e83b9fa5d8e5a24

    • SHA512

      287a261765b67fbe8c692efd42e4eedcb20a8e92dc8f0db741ced8e442afdd1adfc8a58311b27a463f98d74c645b529d41a2055cdefa1c965e40bf72f46194c8

    • SSDEEP

      393216:CqPnLFXlrx2YfVdQuoBFDOETgsvcGCVg4VCE5DoplpI0GKyo/7r:HPLFXNxTPQuoBUEe7wE5IZry

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks