General

  • Target

    1ef652cf753aac92977c2cfea7fe08c4

  • Size

    3.1MB

  • Sample

    231230-2rs79shbd9

  • MD5

    1ef652cf753aac92977c2cfea7fe08c4

  • SHA1

    2c4b9cb5ae6f174c97626c02a4a122e48c43dee2

  • SHA256

    6ebeb06cb2d2beddb16bfd2a4e689ac133b34e734954b694edf0aa2c3ea25ae6

  • SHA512

    3ea9fdbaaf006ffe69b126e92398a779e1887865a8b555f0e39fb31c0ea8edd9d265d79318f3e2ad314dabcab46c4855688472a016c30aafb9aa02ef56870126

  • SSDEEP

    49152:0itOd4k7ydepSSPIZDscC+QZKDVdfu31h:0iK4IIZYfZKDVQFh

Score
10/10

Malware Config

Targets

    • Target

      1ef652cf753aac92977c2cfea7fe08c4

    • Size

      3.1MB

    • MD5

      1ef652cf753aac92977c2cfea7fe08c4

    • SHA1

      2c4b9cb5ae6f174c97626c02a4a122e48c43dee2

    • SHA256

      6ebeb06cb2d2beddb16bfd2a4e689ac133b34e734954b694edf0aa2c3ea25ae6

    • SHA512

      3ea9fdbaaf006ffe69b126e92398a779e1887865a8b555f0e39fb31c0ea8edd9d265d79318f3e2ad314dabcab46c4855688472a016c30aafb9aa02ef56870126

    • SSDEEP

      49152:0itOd4k7ydepSSPIZDscC+QZKDVdfu31h:0iK4IIZYfZKDVQFh

    Score
    10/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v13

Tasks