General

  • Target

    GSJM-ID#FACTAMJHHHBLJYZI.zip

  • Size

    1.5MB

  • Sample

    240418-wnzmzscb2y

  • MD5

    b953d7b5a6441ef8bd958c35e2887b5f

  • SHA1

    af69c3eff3800a9e73267674eea5e3ab07163402

  • SHA256

    ece396625e0a8eb46d5cb651f11c731d11976c5e5ad8ed8cef1be166d692d1fd

  • SHA512

    6fba56a045ef441500514c9152d577eb5a8a23e0e57461dcf39bcaa988eaefb337d26ea4b70d3335ce3c6aad66ad5500e4caf7093edf018b5beb765c960ac631

  • SSDEEP

    24576:SE4fxPG1nhqiEMgXrGCK00u7odmVi6A5LXljoCdz0xqkr4/R/gaZx4s:SvZPG1nhNEnR0u78mkb5FoCCxlHan4s

Score
7/10

Malware Config

Targets

    • Target

      HJUCDedalles-CMOIFact-KUVNPKCTRVBF.exe

    • Size

      107.5MB

    • MD5

      fc6c9a63b0d4f6c0f50be12acedbe5b3

    • SHA1

      46a7fa23693a20528d3fc75310b3f9e67ec99862

    • SHA256

      01b9d0829724d499c2eb2d8088e6037b5bd0540af0f39f1091b17ede04f8d358

    • SHA512

      697e93e1a720f8676c0833070fafd82393866fb0fcfe06c0fe31745c822784e885d3b98bb8f7e0cb7cb93db97713e8d2268e8dd0876b0f8a516f258c307026c6

    • SSDEEP

      49152:O9mBtRxRim+NHSv4iWyJQp+cHczOkzL2KKcOjo:OefxRldS03v32zjo

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      _______________________________________________________________________________1664TNXG9016TPYS.xml

    • Size

      15KB

    • MD5

      4a77fb2014f6d9a165a139bd550916ae

    • SHA1

      9f717b1a5d22f74979934b6c55d22f8990608c3f

    • SHA256

      f2d850025dd7b65c44d979ec74a3f5a77e1c15b4070812be5656887cee95dc59

    • SHA512

      e631cced344b322f56bf47e5b8492a0dfa0f7c90ebc2c89c05b71802c2b2c91da632f5b09dfbb3b2fbbb0da4eef29797c2c65ddf0f5474d379ce06f879d548f1

    • SSDEEP

      384:lh4OElVMetbFP27xWkVbuWFrewThW/wi9NEwi2jHnn1H2:l6PjMspKxnVbuqHThlCN0EHn4

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks