General

  • Target

    mikesploitv2.exe

  • Size

    98.5MB

  • Sample

    231010-zwkqksba91

  • MD5

    2f03500023f77164c0d41b506e506a58

  • SHA1

    b8cdc01fde74dd0779540056788dc48866bc26c4

  • SHA256

    53ee6f451aab76ab10c9dea241e78f36a6081d616b2be4db0ccd3418ff90e965

  • SHA512

    c81a686b7a094049082e73e766cb8d1dd7cbc1ef406764737b031d57df957e40d299a047ff26b7df18c5039fd1640f3cb99fed3be4ec30d96773c0a9cf60e59a

  • SSDEEP

    393216:2iIE7YoE3PHMBbfdQusl7QZq9RoWOv+9faMZS25ocXDdMy:37rEUBbdQu2QMborvSiMUCT9

Score
7/10

Malware Config

Targets

    • Target

      mikesploitv2.exe

    • Size

      98.5MB

    • MD5

      2f03500023f77164c0d41b506e506a58

    • SHA1

      b8cdc01fde74dd0779540056788dc48866bc26c4

    • SHA256

      53ee6f451aab76ab10c9dea241e78f36a6081d616b2be4db0ccd3418ff90e965

    • SHA512

      c81a686b7a094049082e73e766cb8d1dd7cbc1ef406764737b031d57df957e40d299a047ff26b7df18c5039fd1640f3cb99fed3be4ec30d96773c0a9cf60e59a

    • SSDEEP

      393216:2iIE7YoE3PHMBbfdQusl7QZq9RoWOv+9faMZS25ocXDdMy:37rEUBbdQu2QMborvSiMUCT9

    Score
    7/10
    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks