General

  • Target

    ddaffba434764c497134627358568507

  • Size

    786KB

  • Sample

    231222-s46vfscge8

  • MD5

    ddaffba434764c497134627358568507

  • SHA1

    71189800493d69ba810586450b92b1cca1fa8798

  • SHA256

    b9bb4c6b569132cbd450024a516b60d53378005af5bdad25c3e0a6001048aac8

  • SHA512

    c6d70600f7013708929719dc2e38ef28f0941ef68c1a275fca363b7223248f9bc3ecaab3cdeba12af0f62e2bc1aa728cfcbc23f6993265340a1b466e95eba762

  • SSDEEP

    12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+Jig2:vyxPJ/s86szWEuKiflOmMDhPEhL+l2

Score
10/10

Malware Config

Targets

    • Target

      ddaffba434764c497134627358568507

    • Size

      786KB

    • MD5

      ddaffba434764c497134627358568507

    • SHA1

      71189800493d69ba810586450b92b1cca1fa8798

    • SHA256

      b9bb4c6b569132cbd450024a516b60d53378005af5bdad25c3e0a6001048aac8

    • SHA512

      c6d70600f7013708929719dc2e38ef28f0941ef68c1a275fca363b7223248f9bc3ecaab3cdeba12af0f62e2bc1aa728cfcbc23f6993265340a1b466e95eba762

    • SSDEEP

      12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+Jig2:vyxPJ/s86szWEuKiflOmMDhPEhL+l2

    Score
    10/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Tasks