Resubmissions

17-04-2024 09:04

240417-k1zmzaca81 10

17-04-2024 09:02

240417-kzr7haca6x 10

17-04-2024 09:02

240417-kzrkzaca6v 10

17-04-2024 09:02

240417-kzqzfaae49 10

17-04-2024 09:02

240417-kzqcxaae48 10

17-04-2024 09:02

240417-kzprdaae46 10

16-04-2024 14:04

240416-rdht9sdd9w 10

General

  • Target

    da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c

  • Size

    30KB

  • Sample

    240417-kzrkzaca6v

  • MD5

    b950169921d1437cef4a85778cd81636

  • SHA1

    3d20b1c6f93029ab557819efd1f32afc25ac1e88

  • SHA256

    da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c

  • SHA512

    d0b87c1a119ba712c8b85fcb442286133320ec03df589276106987f2947ebbc603dfabaad7e2efbec4998067ef508f1c12bbc5a54502097665315a7b9ba9cf70

  • SSDEEP

    768:Ugj98hSEzIOxO+OZWBaFWsBC7wU6LPLoEf73Wud9BdoJrZmZEMb+:Z0IOxO+OZWBGWsB+w93L39BdoD

Score
10/10

Malware Config

Extracted

Family

systembc

C2

37.220.86.73:4001

Targets

    • Target

      da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c

    • Size

      30KB

    • MD5

      b950169921d1437cef4a85778cd81636

    • SHA1

      3d20b1c6f93029ab557819efd1f32afc25ac1e88

    • SHA256

      da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c

    • SHA512

      d0b87c1a119ba712c8b85fcb442286133320ec03df589276106987f2947ebbc603dfabaad7e2efbec4998067ef508f1c12bbc5a54502097665315a7b9ba9cf70

    • SSDEEP

      768:Ugj98hSEzIOxO+OZWBaFWsBC7wU6LPLoEf73Wud9BdoJrZmZEMb+:Z0IOxO+OZWBGWsB+w93L39BdoD

    Score
    8/10
    • Blocklisted process makes network request

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v15

Tasks