Resubmissions

17-04-2024 12:32

240417-pq4w6agf3w 10

17-04-2024 12:32

240417-pq3dbsgf21 10

17-04-2024 12:32

240417-pq2rssfa82 10

17-04-2024 12:32

240417-pq2f2agf2y 10

17-04-2024 12:32

240417-pqy1xafa74 10

17-04-2024 06:10

240417-gxjwkaff52 10

General

  • Target

    7f873b175b5050bc9c7ac8ca9c5dd029f09e29a8096e6e418318d482365f6ccc

  • Size

    433KB

  • Sample

    240417-pq4w6agf3w

  • MD5

    63c14ad98efd7d302395b3316faaac67

  • SHA1

    efe41d48180f5ebf2f3069e34becae696dc297d1

  • SHA256

    7f873b175b5050bc9c7ac8ca9c5dd029f09e29a8096e6e418318d482365f6ccc

  • SHA512

    6510a438c8fc068325be5b421c396b6ddfc34843467f6e34e0ccf8efabcc30d4a47702fd53b1d58f6f64f75860182598f8a184f5c4279c4bfa912b1c672f4f3c

  • SSDEEP

    12288:TpT7XP/efWnZyhNrQfCs8wvPvRACqOlrobCWoPzTsiBRJsc7nDLqnuFN:TpfXoQP22lMbC5PzT7LLnDL+uFN

Score
10/10

Malware Config

Targets

    • Target

      7f873b175b5050bc9c7ac8ca9c5dd029f09e29a8096e6e418318d482365f6ccc

    • Size

      433KB

    • MD5

      63c14ad98efd7d302395b3316faaac67

    • SHA1

      efe41d48180f5ebf2f3069e34becae696dc297d1

    • SHA256

      7f873b175b5050bc9c7ac8ca9c5dd029f09e29a8096e6e418318d482365f6ccc

    • SHA512

      6510a438c8fc068325be5b421c396b6ddfc34843467f6e34e0ccf8efabcc30d4a47702fd53b1d58f6f64f75860182598f8a184f5c4279c4bfa912b1c672f4f3c

    • SSDEEP

      12288:TpT7XP/efWnZyhNrQfCs8wvPvRACqOlrobCWoPzTsiBRJsc7nDLqnuFN:TpfXoQP22lMbC5PzT7LLnDL+uFN

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v15

Tasks