General

  • Target

    bf395090b2f9e533a30c88d635cf1fba

  • Size

    786KB

  • Sample

    231222-rpvm7shedr

  • MD5

    bf395090b2f9e533a30c88d635cf1fba

  • SHA1

    8268c7b3d81be88c745eb5fac009fab19a859fa3

  • SHA256

    21a50a3908ede8d31967bfd0141302e358fc64ed53a5fa1f38971f2c61682456

  • SHA512

    a0d25dff335ed350dd7b5bc5ef58a98af72ffa6401006e5b0c1bb76ac0442bb63195c6ef4af4e49dae0134c339b0bce12d0930d7999bf1963f0541dd4f26ad36

  • SSDEEP

    12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+JigT:vyxPJ/s86szWEuKiflOmMDhPEhL+lT

Score
10/10

Malware Config

Targets

    • Target

      bf395090b2f9e533a30c88d635cf1fba

    • Size

      786KB

    • MD5

      bf395090b2f9e533a30c88d635cf1fba

    • SHA1

      8268c7b3d81be88c745eb5fac009fab19a859fa3

    • SHA256

      21a50a3908ede8d31967bfd0141302e358fc64ed53a5fa1f38971f2c61682456

    • SHA512

      a0d25dff335ed350dd7b5bc5ef58a98af72ffa6401006e5b0c1bb76ac0442bb63195c6ef4af4e49dae0134c339b0bce12d0930d7999bf1963f0541dd4f26ad36

    • SSDEEP

      12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+JigT:vyxPJ/s86szWEuKiflOmMDhPEhL+lT

    Score
    10/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

Command and Control

Proxy

1
T1090

Tasks