General

  • Target

    EntropyCrack.exe

  • Size

    17.7MB

  • Sample

    231123-c4zs5sfe93

  • MD5

    dc87c0195358b499111717553896bf11

  • SHA1

    5799afcd8103f826eb85737a4de083a0aab131ed

  • SHA256

    ad671181b60d2cd470b1fab2ac88abd95a1daaa235eb01711be705fc59f1fce5

  • SHA512

    2d556d84581f39728bed2e3d00b945d8d42466e53915f8fae278210852122312e2b709a1aa9a962dd4b89b5214251a14cce53b191c6ffa598a6d73a117d48f13

  • SSDEEP

    393216:mqPnLFXlr8gQpDOETgsvfGz3gK1ctvEgNadLKq:LPLFXNlQoEaD1cCdB7

Malware Config

Targets

    • Target

      EntropyCrack.exe

    • Size

      17.7MB

    • MD5

      dc87c0195358b499111717553896bf11

    • SHA1

      5799afcd8103f826eb85737a4de083a0aab131ed

    • SHA256

      ad671181b60d2cd470b1fab2ac88abd95a1daaa235eb01711be705fc59f1fce5

    • SHA512

      2d556d84581f39728bed2e3d00b945d8d42466e53915f8fae278210852122312e2b709a1aa9a962dd4b89b5214251a14cce53b191c6ffa598a6d73a117d48f13

    • SSDEEP

      393216:mqPnLFXlr8gQpDOETgsvfGz3gK1ctvEgNadLKq:LPLFXNlQoEaD1cCdB7

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      main.pyc

    • Size

      7KB

    • MD5

      d6adeb900d204b7dff3958c8010ec7ab

    • SHA1

      2f7fe8b1264494ea3fbd48689d1f8d901ace1c13

    • SHA256

      71ce4cbf4efdb59f0d500c83569bbfc598ecd8b288dbd4cecf20fbc476ff0caf

    • SHA512

      5d7df80350ba608602c5f107329152485ed0c7e05c47ba3a54204218b89c5e8306879482d085733f89e7698b8396b33bd3e14f3191d83fa62c9c88157454980a

    • SSDEEP

      96:wN9lpey3DeuwYoiQeMRN3nuWdXw+e819roVatAzFdJhwAMr2irF+Mdw94gn/Kv:wz3tD8eMRNeWdXwkY8tArJhwanMdwTnw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks