General

  • Target

    6ee4a685777a9c7df55d58a85105900142ea42d1d85720b932fdaa98662906d5

  • Size

    6.8MB

  • Sample

    231010-ztkykacg98

  • MD5

    fd00869a200aeff7db5613ff2a762ccf

  • SHA1

    2779c3d4fcec4b780889341d7684c4f8fc2746d2

  • SHA256

    6ee4a685777a9c7df55d58a85105900142ea42d1d85720b932fdaa98662906d5

  • SHA512

    165e983554b79ef0d3bc4627218b559031ddfac7aa3f7213c38d90742a9c6094ff5394aecc4089e734feddfaa9af2449baae8eb48f71fc93456145202337ac3b

  • SSDEEP

    196608:ctck2ymjIDQMdNHuRKDqGnOk1CPwDv3uF0jaRCiBrqW4yE20VJo:ct/aKQMdNHuQqGnOk1CPwDv3uFwanBrR

Score
7/10

Malware Config

Targets

    • Target

      6ee4a685777a9c7df55d58a85105900142ea42d1d85720b932fdaa98662906d5

    • Size

      6.8MB

    • MD5

      fd00869a200aeff7db5613ff2a762ccf

    • SHA1

      2779c3d4fcec4b780889341d7684c4f8fc2746d2

    • SHA256

      6ee4a685777a9c7df55d58a85105900142ea42d1d85720b932fdaa98662906d5

    • SHA512

      165e983554b79ef0d3bc4627218b559031ddfac7aa3f7213c38d90742a9c6094ff5394aecc4089e734feddfaa9af2449baae8eb48f71fc93456145202337ac3b

    • SSDEEP

      196608:ctck2ymjIDQMdNHuRKDqGnOk1CPwDv3uF0jaRCiBrqW4yE20VJo:ct/aKQMdNHuQqGnOk1CPwDv3uFwanBrR

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks