General

  • Target

    4050f030ef2f4ba2751b526d252f9d82

  • Size

    566KB

  • Sample

    231222-bftfsacfc3

  • MD5

    4050f030ef2f4ba2751b526d252f9d82

  • SHA1

    362b74934fc4f8799478c761d71e79814920c205

  • SHA256

    b9761457ad9ad14ec676a5077376aa084b8c8e1cc2bdc9748fa407bd7de8686e

  • SHA512

    2f6059c04161f5520c496d762c4df91e2366d203c02167d8780c2b4ca8af002a7773e74cb4575dec5050f0a5c3ef5e52302b1d3ed41878ad4b741021e86b2947

  • SSDEEP

    12288:Bz4ubZCXMtdUKat+YH7/yJ2je3rojGvB/WaEYvWC:pjOMtd1a/yl3KOj7

Malware Config

Targets

    • Target

      4050f030ef2f4ba2751b526d252f9d82

    • Size

      566KB

    • MD5

      4050f030ef2f4ba2751b526d252f9d82

    • SHA1

      362b74934fc4f8799478c761d71e79814920c205

    • SHA256

      b9761457ad9ad14ec676a5077376aa084b8c8e1cc2bdc9748fa407bd7de8686e

    • SHA512

      2f6059c04161f5520c496d762c4df91e2366d203c02167d8780c2b4ca8af002a7773e74cb4575dec5050f0a5c3ef5e52302b1d3ed41878ad4b741021e86b2947

    • SSDEEP

      12288:Bz4ubZCXMtdUKat+YH7/yJ2je3rojGvB/WaEYvWC:pjOMtd1a/yl3KOj7

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks