General

  • Target

    4a137a444e3610a5c38269a3ef74e3a92e56558650f813acc5a88d82b9cab126

  • Size

    220KB

  • Sample

    240409-ytgqgace3v

  • MD5

    144094180fe904cc88e925bc6baa6f60

  • SHA1

    52f0c7ade004f7cb0bf501c3da708a552e60ebf7

  • SHA256

    4a137a444e3610a5c38269a3ef74e3a92e56558650f813acc5a88d82b9cab126

  • SHA512

    574fce0a2422d0f599c324145e46b9b85a8a992295845fcd52a9ba46f6446c6d3dc6fa5c4a82487c9d4290d0d1d8b2ec378d8cc9b4069b7a6b70e49215ede539

  • SSDEEP

    3072:853mQ7JtnP5I09qgmBBAWgjSvwN/oGW1Otc:UmKJtna2qgmBNgQw+

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      4a137a444e3610a5c38269a3ef74e3a92e56558650f813acc5a88d82b9cab126

    • Size

      220KB

    • MD5

      144094180fe904cc88e925bc6baa6f60

    • SHA1

      52f0c7ade004f7cb0bf501c3da708a552e60ebf7

    • SHA256

      4a137a444e3610a5c38269a3ef74e3a92e56558650f813acc5a88d82b9cab126

    • SHA512

      574fce0a2422d0f599c324145e46b9b85a8a992295845fcd52a9ba46f6446c6d3dc6fa5c4a82487c9d4290d0d1d8b2ec378d8cc9b4069b7a6b70e49215ede539

    • SSDEEP

      3072:853mQ7JtnP5I09qgmBBAWgjSvwN/oGW1Otc:UmKJtna2qgmBNgQw+

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks