General

  • Target

    file_text.exe

  • Size

    17.6MB

  • Sample

    231029-whtjsaae45

  • MD5

    a19a5c06b0f09e8e289f3654a2923556

  • SHA1

    62d3074e3e8593626e4b6a3930a8fa702dcc9935

  • SHA256

    c982b578ebbab371f95e49a67d29430186d5964d974e552d1cbe8234cb2b10f7

  • SHA512

    3e1e4585dfe1529979a157678adfcd2140b0b703f3c2d89d3fcc4b95f008470ecfaa9ca6e12724fb10ff26cff14f1127e09c82f954a55ed68a0c04c7f59522ac

  • SSDEEP

    393216:hqPnLFXlr7gQpDOETgsvfGWg+d+vEhHuIaLy:IPLFXNEQoE/5Vro

Malware Config

Targets

    • Target

      file_text.exe

    • Size

      17.6MB

    • MD5

      a19a5c06b0f09e8e289f3654a2923556

    • SHA1

      62d3074e3e8593626e4b6a3930a8fa702dcc9935

    • SHA256

      c982b578ebbab371f95e49a67d29430186d5964d974e552d1cbe8234cb2b10f7

    • SHA512

      3e1e4585dfe1529979a157678adfcd2140b0b703f3c2d89d3fcc4b95f008470ecfaa9ca6e12724fb10ff26cff14f1127e09c82f954a55ed68a0c04c7f59522ac

    • SSDEEP

      393216:hqPnLFXlr7gQpDOETgsvfGWg+d+vEhHuIaLy:IPLFXNEQoE/5Vro

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks