General

  • Target

    tmpo1iajgbr

  • Size

    9.3MB

  • Sample

    240312-rsj1waah21

  • MD5

    29eab5468dc3ba1c089a1dfaa6b711ef

  • SHA1

    72dd9666c9c93a2a871b56459818a349d0a76a2f

  • SHA256

    301a2c13432fc11a2809225e0346ddfd5c253105197c5f6b0a7ee0306038bd43

  • SHA512

    8f0ba3166e4a6f54636d741de83c778b26645ff830656838fa5c3d4864dff3623cd39b0aab59cfcb7fe8d2fac8a314543f2d105f75487bd883f7f9ea6cc2e825

  • SSDEEP

    98304:P1Oy7EyAJ4jbIsCj4rC4HHcUhEeDkEROo2HkNY7:tJ7JAJ4jbS4HHcheio2HSY7

Score
7/10

Malware Config

Targets

    • Target

      tmpo1iajgbr

    • Size

      9.3MB

    • MD5

      29eab5468dc3ba1c089a1dfaa6b711ef

    • SHA1

      72dd9666c9c93a2a871b56459818a349d0a76a2f

    • SHA256

      301a2c13432fc11a2809225e0346ddfd5c253105197c5f6b0a7ee0306038bd43

    • SHA512

      8f0ba3166e4a6f54636d741de83c778b26645ff830656838fa5c3d4864dff3623cd39b0aab59cfcb7fe8d2fac8a314543f2d105f75487bd883f7f9ea6cc2e825

    • SSDEEP

      98304:P1Oy7EyAJ4jbIsCj4rC4HHcUhEeDkEROo2HkNY7:tJ7JAJ4jbS4HHcheio2HSY7

    Score
    7/10
    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks