Resubmissions

17-04-2024 12:16

240417-pfx1vsfh7v 10

17-04-2024 12:16

240417-pfxebsed54 10

17-04-2024 12:16

240417-pfwsssed52 10

17-04-2024 12:16

240417-pftcnsed48 10

17-04-2024 12:16

240417-pfsq5sfh7s 10

16-04-2024 13:45

240416-q2cgqada9t 10

General

  • Target

    90f68e40e22da341888a881fa701d0a26adbfb8a62693044d137826fc1c677fa

  • Size

    1.3MB

  • Sample

    240416-q2cgqada9t

  • MD5

    1ca13ce3fd4bc03072da2c09923cea0d

  • SHA1

    a7e301c835a2543778751ccd37d4d442f18f19fe

  • SHA256

    90f68e40e22da341888a881fa701d0a26adbfb8a62693044d137826fc1c677fa

  • SHA512

    54be0c00ec5f5f1d8663e912ebb503f41a94ff003babf4ed9c49bc2ead32ec46127ea191014e2e607e5395104626d2d2b4af8f3bad8c04684d101a0f76d8e09d

  • SSDEEP

    12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqr:hQYxtmiEEYIjhyQj6vfNqr

Score
10/10

Malware Config

Targets

    • Target

      90f68e40e22da341888a881fa701d0a26adbfb8a62693044d137826fc1c677fa

    • Size

      1.3MB

    • MD5

      1ca13ce3fd4bc03072da2c09923cea0d

    • SHA1

      a7e301c835a2543778751ccd37d4d442f18f19fe

    • SHA256

      90f68e40e22da341888a881fa701d0a26adbfb8a62693044d137826fc1c677fa

    • SHA512

      54be0c00ec5f5f1d8663e912ebb503f41a94ff003babf4ed9c49bc2ead32ec46127ea191014e2e607e5395104626d2d2b4af8f3bad8c04684d101a0f76d8e09d

    • SSDEEP

      12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqr:hQYxtmiEEYIjhyQj6vfNqr

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v15

Tasks