General

  • Target

    M$tempSpoofer.exe

  • Size

    84.7MB

  • Sample

    240318-1p1c5abe5s

  • MD5

    6541097814bff782bf8591a9692e7f6d

  • SHA1

    9ca8da0b9b851517d6a001efb0540007cfa6c845

  • SHA256

    d6041caeb7deed4e141de10acef283b862ec87219eebf84ab3a5e59283669f8e

  • SHA512

    20420114288b1ca24538ecd7cbdfaf67bbd51a4f015469194acb3e6f4108e65e6cb01a6e9435ea16addeb22bcd4e059db922743607f87fa18b4c26f222d3d87b

  • SSDEEP

    1572864:TUXPU1e4iamkhLDyPl4QiZeznqf3Gd6xdnj+Y/5szRd9ME7bZNRW79SRAoUQ:TUX4e4iadhLDy943sznyo6V/s917Rk9+

Score
7/10
upx

Malware Config

Targets

    • Target

      M$tempSpoofer.exe

    • Size

      84.7MB

    • MD5

      6541097814bff782bf8591a9692e7f6d

    • SHA1

      9ca8da0b9b851517d6a001efb0540007cfa6c845

    • SHA256

      d6041caeb7deed4e141de10acef283b862ec87219eebf84ab3a5e59283669f8e

    • SHA512

      20420114288b1ca24538ecd7cbdfaf67bbd51a4f015469194acb3e6f4108e65e6cb01a6e9435ea16addeb22bcd4e059db922743607f87fa18b4c26f222d3d87b

    • SSDEEP

      1572864:TUXPU1e4iamkhLDyPl4QiZeznqf3Gd6xdnj+Y/5szRd9ME7bZNRW79SRAoUQ:TUX4e4iadhLDy943sznyo6V/s917Rk9+

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      yN.pyc

    • Size

      191KB

    • MD5

      35f36941d5d8b393179814a08bf349bd

    • SHA1

      fae30f77578bf2b14bf07eb262e3c5eec45323c6

    • SHA256

      9012c08f0c98a004f9729c9502744cf09bd1bc23343b9eeba7ed36f03a6d9e96

    • SHA512

      13c3abd0d443f678fa8e7340566cfaeff9af6fcf78c9caf92fd62eba939f9caaa872b2fb0d369876fb085453d978aa484aee21c4040daf89a689caee59ec057e

    • SSDEEP

      3072:VB5oR4C3rxsC3sW4q8Y9zo7YFAMtmIsJTqUPJN:/U4C3rSC3sWTpFFptmIYqUT

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks