General

  • Target

    925ade29ba8a19d8ee9c975f7a2e7b49

  • Size

    3.1MB

  • Sample

    240205-syavtsdahp

  • MD5

    925ade29ba8a19d8ee9c975f7a2e7b49

  • SHA1

    e77bd3fbb537215e4c932f1c1305cef2e275996f

  • SHA256

    b73df585c4404f7d9336de13f727cb3b2245ed2eec4016b9925641f444bc4eab

  • SHA512

    b1129b8e3b6b770fd8dace8cf67cfc8a6e968068f46772dd768efaccb7b42145ce5809936c945d2428c63b3a9471d054a8c3eee1aa4ad4ea45c20bc77d39ec7b

  • SSDEEP

    49152:NitOd4k7ydepSSPIZDscC+QZKDVdfu31e:NiK4IIZYfZKDVQFe

Score
10/10

Malware Config

Targets

    • Target

      925ade29ba8a19d8ee9c975f7a2e7b49

    • Size

      3.1MB

    • MD5

      925ade29ba8a19d8ee9c975f7a2e7b49

    • SHA1

      e77bd3fbb537215e4c932f1c1305cef2e275996f

    • SHA256

      b73df585c4404f7d9336de13f727cb3b2245ed2eec4016b9925641f444bc4eab

    • SHA512

      b1129b8e3b6b770fd8dace8cf67cfc8a6e968068f46772dd768efaccb7b42145ce5809936c945d2428c63b3a9471d054a8c3eee1aa4ad4ea45c20bc77d39ec7b

    • SSDEEP

      49152:NitOd4k7ydepSSPIZDscC+QZKDVdfu31e:NiK4IIZYfZKDVQFe

    Score
    10/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v13

Tasks