General

  • Target

    170bc2d2ea2cd61c564157788dede16026e4d51fe162503306c8f01c204e154b

  • Size

    59KB

  • Sample

    240309-zvsd2aac64

  • MD5

    6a82d83d561949f77a0b4e9d529ec19e

  • SHA1

    80baddf85b8de653f3257590513c94452e133de1

  • SHA256

    170bc2d2ea2cd61c564157788dede16026e4d51fe162503306c8f01c204e154b

  • SHA512

    e048c61cfe4eb3c75abf882505fed53b799811570723e40a6f5d615cd5572d8340d63417c829b1b7447027c2a1367d316c31371e5c3c9c3d898c9e78537268d6

  • SSDEEP

    1536:0M6478/JKvXnLI0Cu9VwH5pFrwL2hrvZaMtHQrwzg:tV7IJKfku9CH5wf

Score
7/10

Malware Config

Targets

    • Target

      170bc2d2ea2cd61c564157788dede16026e4d51fe162503306c8f01c204e154b

    • Size

      59KB

    • MD5

      6a82d83d561949f77a0b4e9d529ec19e

    • SHA1

      80baddf85b8de653f3257590513c94452e133de1

    • SHA256

      170bc2d2ea2cd61c564157788dede16026e4d51fe162503306c8f01c204e154b

    • SHA512

      e048c61cfe4eb3c75abf882505fed53b799811570723e40a6f5d615cd5572d8340d63417c829b1b7447027c2a1367d316c31371e5c3c9c3d898c9e78537268d6

    • SSDEEP

      1536:0M6478/JKvXnLI0Cu9VwH5pFrwL2hrvZaMtHQrwzg:tV7IJKfku9CH5wf

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks