General

  • Target

    8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI

  • Size

    95KB

  • Sample

    240508-22gbfseg64

  • MD5

    8d6b9e4f8be7ff79d3fe7c18a49dd3b0

  • SHA1

    d1dac41341a05b7abb3ebcadf63c02e4cd74ba72

  • SHA256

    2a9eea315eeeb6558e0f58d5a95661b3722e33d1368968eca226ff980450dd36

  • SHA512

    c878b64f19fc28ffc1eb10f766e2be205f249d0379711c221f60a5e74a137851c65b1955f4f04ebb34e504deaf005c0e4f5c13a8feda97a97da545784dcdf7ed

  • SSDEEP

    768:3/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pe:3RsvcdcQjosnvng6uQ1Jx

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Targets

    • Target

      8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI

    • Size

      95KB

    • MD5

      8d6b9e4f8be7ff79d3fe7c18a49dd3b0

    • SHA1

      d1dac41341a05b7abb3ebcadf63c02e4cd74ba72

    • SHA256

      2a9eea315eeeb6558e0f58d5a95661b3722e33d1368968eca226ff980450dd36

    • SHA512

      c878b64f19fc28ffc1eb10f766e2be205f249d0379711c221f60a5e74a137851c65b1955f4f04ebb34e504deaf005c0e4f5c13a8feda97a97da545784dcdf7ed

    • SSDEEP

      768:3/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pe:3RsvcdcQjosnvng6uQ1Jx

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks