General
-
Target
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6
-
Size
41KB
-
Sample
240410-xb5txabd4s
-
MD5
fe6f947f8a83695f53aff514fbc7b5b2
-
SHA1
ab2be2b7773db48226b9781f07fab54ae0501b43
-
SHA256
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6
-
SHA512
6d5e70af475f982ac19775d9beb2d4df96cf8030916cf560f37640757a7a1d49eca403abadc3acb0505f5681fd87228a4615fec1349f0d53005de96ab64d4891
-
SSDEEP
768:xIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77DPQ1TTGfGYhb:xI0OGrOy6NvSpMZrQ1J2
Static task
static1
Behavioral task
behavioral1
Sample
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6
-
Size
41KB
-
MD5
fe6f947f8a83695f53aff514fbc7b5b2
-
SHA1
ab2be2b7773db48226b9781f07fab54ae0501b43
-
SHA256
0db8ca15096f8d3877fb75093f25e3e858e50332d547b6a78c7f4acaa1da34f6
-
SHA512
6d5e70af475f982ac19775d9beb2d4df96cf8030916cf560f37640757a7a1d49eca403abadc3acb0505f5681fd87228a4615fec1349f0d53005de96ab64d4891
-
SSDEEP
768:xIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77DPQ1TTGfGYhb:xI0OGrOy6NvSpMZrQ1J2
Score10/10-
Detects executables built or packed with MPress PE compressor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-