General

  • Target

    SxRc main.zip

  • Size

    80.5MB

  • Sample

    240129-mqlz8sgaf3

  • MD5

    a28a2094953fa9206b11eb569a6361cf

  • SHA1

    9bfc28558352a49d436b2e420440ed239e2a795d

  • SHA256

    89b7661425b8fe1b22768b9b912cae83f2e90af39ff3b12ed94335bb0e15ada1

  • SHA512

    ad301a4cf7c9346f8d5c8e5b69f1062c9845523383292fadf9b28038e133e94198f7586dd3c17d2cfd1ec485639c5f1a100342f43e0a324c829dbe9fc285e213

  • SSDEEP

    1572864:Z2M+zPU1e4iamkhLDyPlfQuZV/tQE88nZGjSYukZg7rruE7sZti6vWOxUDZchN:ZZ+z4e4iadhLDy9fV3/tQonZODzZg/rq

Score
7/10

Malware Config

Targets

    • Target

      SxRc main/SxRc.exe

    • Size

      80.5MB

    • MD5

      884d78d4a8bf0e2893e7ea1fa7fea47d

    • SHA1

      165152ec85322214661a7ad7ffe45f9a4e3c015b

    • SHA256

      be977ebf21559d5e894ef65b469a53f2b38643cabda62e4d505be03f4c6526c3

    • SHA512

      daf932f6ea966ed4f511fce33bdc4ee79c760af3845b650f65995e50e21e962a7d577354196d19fa4e473ed2f2655daa6b81528d0bb15b083958d91613be9848

    • SSDEEP

      1572864:m2M+zPU1e4iamkhLDyPlfQuZV/tQE88nZGjSYukZg7rruE7sZti6vWOxUDZch:mZ+z4e4iadhLDy9fV3/tQonZODzZg/rr

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks