General

  • Target

    be901451e94e55beb3c7489d008c6403.bin

  • Size

    49MB

  • Sample

    231121-dc6caabg24

  • MD5

    be901451e94e55beb3c7489d008c6403

  • SHA1

    c5d0a241a18e8f75b392e9db9f30581c806d70cd

  • SHA256

    9abf05595392b951e152a4f03ef5ac7aeb5a177612f13624a5213e787b011657

  • SHA512

    727fb7b7a200bb05015cd2070fecf38e09d1c7c55ba578562fa36717b602d910d9238ef8be7a4122100022298ef347c84a3c1d977f7cb149332d9e95cc608bb3

  • SSDEEP

    393216:EZ0JhQn4GIICwK/y6MPqPOb88tzG0uda2Ro:EZ0JhQ4UhK/FMiPO2Ay

Score
7/10

Malware Config

Targets

    • Target

      be901451e94e55beb3c7489d008c6403.bin

    • Size

      49MB

    • MD5

      be901451e94e55beb3c7489d008c6403

    • SHA1

      c5d0a241a18e8f75b392e9db9f30581c806d70cd

    • SHA256

      9abf05595392b951e152a4f03ef5ac7aeb5a177612f13624a5213e787b011657

    • SHA512

      727fb7b7a200bb05015cd2070fecf38e09d1c7c55ba578562fa36717b602d910d9238ef8be7a4122100022298ef347c84a3c1d977f7cb149332d9e95cc608bb3

    • SSDEEP

      393216:EZ0JhQn4GIICwK/y6MPqPOb88tzG0uda2Ro:EZ0JhQ4UhK/FMiPO2Ay

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks