General

  • Target

    e99c79bc77c3b9679a974cbb9fd4fe2a952c675f56a05503b505b24304ba23ba.exe

  • Size

    408KB

  • Sample

    240508-w61m1abg42

  • MD5

    d98749205fff0909e335b5eeb1378973

  • SHA1

    927e94563e873026f5a3964fee8b008c9ad84b7b

  • SHA256

    e99c79bc77c3b9679a974cbb9fd4fe2a952c675f56a05503b505b24304ba23ba

  • SHA512

    c635fe74b819b21f35a6a3c8548e25c519323caf17c0fea04efd03a4116ef2a8d4036c3788c51553ba7045f2ec6c5c9adf534831f07f16111a8a142d5ab28205

  • SSDEEP

    6144:iDzDSWsuWBjDbzcEXDmm2pcITwhoner+zP308sq+0cUkV8lQnr3Z5n19YzpYmZj:iDXSfDUkmm2px3NgqUUkV8lqp162mZj

Score
10/10

Malware Config

Targets

    • Target

      e99c79bc77c3b9679a974cbb9fd4fe2a952c675f56a05503b505b24304ba23ba.exe

    • Size

      408KB

    • MD5

      d98749205fff0909e335b5eeb1378973

    • SHA1

      927e94563e873026f5a3964fee8b008c9ad84b7b

    • SHA256

      e99c79bc77c3b9679a974cbb9fd4fe2a952c675f56a05503b505b24304ba23ba

    • SHA512

      c635fe74b819b21f35a6a3c8548e25c519323caf17c0fea04efd03a4116ef2a8d4036c3788c51553ba7045f2ec6c5c9adf534831f07f16111a8a142d5ab28205

    • SSDEEP

      6144:iDzDSWsuWBjDbzcEXDmm2pcITwhoner+zP308sq+0cUkV8lQnr3Z5n19YzpYmZj:iDXSfDUkmm2px3NgqUUkV8lqp162mZj

    Score
    10/10
    • SSLoad

      SSLoad Unpacked DLL payload.

    • Detects SSLoad Unpacked payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks