General

  • Target

    136ad5f8e92b3e624f3608c4ff8cd5f3

  • Size

    3.1MB

  • Sample

    231230-kc625schb4

  • MD5

    136ad5f8e92b3e624f3608c4ff8cd5f3

  • SHA1

    b425cc71a0fb8a1b4037b045b00c794df235ed31

  • SHA256

    011228b7880200728874d77a922898fb5ee87050f08865c19873a9f78c7b5919

  • SHA512

    364cbb4ab78dede261604290e6847087933b1cc018fbb17e30d82c0c019b7eedb7fa10f8f8aab636ad89cf93ce434ed5a90a9301520c24ffa2452659ad7f09f8

  • SSDEEP

    49152:uitOd4k7ydepSSPIZDscC+QZKDVdfu31Y:uiK4IIZYfZKDVQFY

Score
10/10

Malware Config

Targets

    • Target

      136ad5f8e92b3e624f3608c4ff8cd5f3

    • Size

      3.1MB

    • MD5

      136ad5f8e92b3e624f3608c4ff8cd5f3

    • SHA1

      b425cc71a0fb8a1b4037b045b00c794df235ed31

    • SHA256

      011228b7880200728874d77a922898fb5ee87050f08865c19873a9f78c7b5919

    • SHA512

      364cbb4ab78dede261604290e6847087933b1cc018fbb17e30d82c0c019b7eedb7fa10f8f8aab636ad89cf93ce434ed5a90a9301520c24ffa2452659ad7f09f8

    • SSDEEP

      49152:uitOd4k7ydepSSPIZDscC+QZKDVdfu31Y:uiK4IIZYfZKDVQFY

    Score
    10/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks