General

  • Target

    b4d051eb4e505340638048ae8ada9899

  • Size

    3.1MB

  • Sample

    240305-qr1rkagg86

  • MD5

    b4d051eb4e505340638048ae8ada9899

  • SHA1

    fadd88fad71647894d3aa76010c6606a60388f23

  • SHA256

    d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d

  • SHA512

    cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9

  • SSDEEP

    49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr

Score
10/10

Malware Config

Targets

    • Target

      b4d051eb4e505340638048ae8ada9899

    • Size

      3.1MB

    • MD5

      b4d051eb4e505340638048ae8ada9899

    • SHA1

      fadd88fad71647894d3aa76010c6606a60388f23

    • SHA256

      d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d

    • SHA512

      cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9

    • SSDEEP

      49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr

    Score
    10/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v13

Tasks