General

  • Target

    a32ed8cec9861b86954baf4811a4c469eb9434015bf6ad6bbfec6226c313581e

  • Size

    145KB

  • Sample

    240501-bxrnhseg39

  • MD5

    5647d4670bf453ea46b04b70cee2eb41

  • SHA1

    9cff36e41153665ca479950133b9521a850ceee5

  • SHA256

    a32ed8cec9861b86954baf4811a4c469eb9434015bf6ad6bbfec6226c313581e

  • SHA512

    d27f7d110ffd521c9a144c99c62a5fce6b1c3956a11edf2e3160f28dc4ac40c3a32953d2d2f66f6b855195426ea35282d94cd20ce0cf8c947e39119bf3ada26a

  • SSDEEP

    1536:0MvKGF80crNopDaPsDHtcGquYVnPKp4ZAk3rf:tvvj00DaEDAuYFPJZAG

Score
10/10
upx

Malware Config

Targets

    • Target

      a32ed8cec9861b86954baf4811a4c469eb9434015bf6ad6bbfec6226c313581e

    • Size

      145KB

    • MD5

      5647d4670bf453ea46b04b70cee2eb41

    • SHA1

      9cff36e41153665ca479950133b9521a850ceee5

    • SHA256

      a32ed8cec9861b86954baf4811a4c469eb9434015bf6ad6bbfec6226c313581e

    • SHA512

      d27f7d110ffd521c9a144c99c62a5fce6b1c3956a11edf2e3160f28dc4ac40c3a32953d2d2f66f6b855195426ea35282d94cd20ce0cf8c947e39119bf3ada26a

    • SSDEEP

      1536:0MvKGF80crNopDaPsDHtcGquYVnPKp4ZAk3rf:tvvj00DaEDAuYFPJZAG

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks