General

  • Target

    NEAS.3345d0f40d623b53613eaff5717c20f0.exe

  • Size

    123KB

  • Sample

    231107-d1n3xaag5s

  • MD5

    3345d0f40d623b53613eaff5717c20f0

  • SHA1

    6397b5b4cb32f6e1887cb9bc58ac60e9111b7c2c

  • SHA256

    5af9beed8ac0428e9bdc2e9fb69ae277afe5e6b77124772c643ee4771247ffa6

  • SHA512

    9f123acc7ab1b10832dde2b5f928c4e7af086d94c74aad302d5d08525fd9d8044127b50eba34429b8af24ec289137b0f0df541c8172ddcb572ce56a09a27ed84

  • SSDEEP

    768:vzQYScGrIubHuYtvdxwYHw5FAe2QmncwxwtH2NM3qm9IFYPRBrd8qFKO4l:bQTIubHy5wQmOcM1WF0BrKqFKO4l

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      NEAS.3345d0f40d623b53613eaff5717c20f0.exe

    • Size

      123KB

    • MD5

      3345d0f40d623b53613eaff5717c20f0

    • SHA1

      6397b5b4cb32f6e1887cb9bc58ac60e9111b7c2c

    • SHA256

      5af9beed8ac0428e9bdc2e9fb69ae277afe5e6b77124772c643ee4771247ffa6

    • SHA512

      9f123acc7ab1b10832dde2b5f928c4e7af086d94c74aad302d5d08525fd9d8044127b50eba34429b8af24ec289137b0f0df541c8172ddcb572ce56a09a27ed84

    • SSDEEP

      768:vzQYScGrIubHuYtvdxwYHw5FAe2QmncwxwtH2NM3qm9IFYPRBrd8qFKO4l:bQTIubHy5wQmOcM1WF0BrKqFKO4l

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks