General

  • Target

    c9599a59ec2d9e6f2c7a0eb190a52818

  • Size

    56KB

  • Sample

    240409-3exklahg28

  • MD5

    c9599a59ec2d9e6f2c7a0eb190a52818

  • SHA1

    055639cf33e08b9cc85be18ef57eb76c595c4543

  • SHA256

    05bc03dc4f6a46c5250bec45fc83535d422fb3e270affde1db2936a04935042c

  • SHA512

    eab008c9bf24c8f0d121838436231badb24fd1e6298fe9acacc0288f784a105aaabf8db5f00786e6b5866aa4d9d1f8d13a887a90670385468a9f21c66bb3299a

  • SSDEEP

    768:lbYqFx1yy9VuWyEj0vaQxBrTvBFE33BiKBX4Bn7jKg:lbYziV9yEjyaQxx7wHBiKIn7+g

Score
7/10

Malware Config

Targets

    • Target

      c9599a59ec2d9e6f2c7a0eb190a52818

    • Size

      56KB

    • MD5

      c9599a59ec2d9e6f2c7a0eb190a52818

    • SHA1

      055639cf33e08b9cc85be18ef57eb76c595c4543

    • SHA256

      05bc03dc4f6a46c5250bec45fc83535d422fb3e270affde1db2936a04935042c

    • SHA512

      eab008c9bf24c8f0d121838436231badb24fd1e6298fe9acacc0288f784a105aaabf8db5f00786e6b5866aa4d9d1f8d13a887a90670385468a9f21c66bb3299a

    • SSDEEP

      768:lbYqFx1yy9VuWyEj0vaQxBrTvBFE33BiKBX4Bn7jKg:lbYziV9yEjyaQxx7wHBiKIn7+g

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks