General

  • Target

    f9f4ef454068eef7fcc1920b05c9695c.bin

  • Size

    16.9MB

  • Sample

    240125-dxvraafebq

  • MD5

    f9f4ef454068eef7fcc1920b05c9695c

  • SHA1

    0354fd1c89e587a09e10ed43f2880f9e7e0d7bd0

  • SHA256

    f00afc37a9f5270cfb453c0c7db3881360e3dee005d1b978857a0e2eea14dae4

  • SHA512

    b53118e59df491335edb35c9306578b0009b737ebdad4b9985a487cb28a2f96dfd532f83fd4c851160e54d61c0b718cacd8ae1bd2ac2f259f29b823d0815871e

  • SSDEEP

    393216:3h9SBLFGQZXG40csdLK34FqyRgs3dKtriSg7FI:x9eFGQv+e3TGElRg

Score
7/10

Malware Config

Targets

    • Target

      f9f4ef454068eef7fcc1920b05c9695c.bin

    • Size

      16.9MB

    • MD5

      f9f4ef454068eef7fcc1920b05c9695c

    • SHA1

      0354fd1c89e587a09e10ed43f2880f9e7e0d7bd0

    • SHA256

      f00afc37a9f5270cfb453c0c7db3881360e3dee005d1b978857a0e2eea14dae4

    • SHA512

      b53118e59df491335edb35c9306578b0009b737ebdad4b9985a487cb28a2f96dfd532f83fd4c851160e54d61c0b718cacd8ae1bd2ac2f259f29b823d0815871e

    • SSDEEP

      393216:3h9SBLFGQZXG40csdLK34FqyRgs3dKtriSg7FI:x9eFGQv+e3TGElRg

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks