General

  • Target

    app.com

  • Size

    1.5MB

  • Sample

    240508-wcl8hsfg21

  • MD5

    bd3231011448b2d6a335032d11c12cad

  • SHA1

    b14bdeccca499668fac5049890bb7f3e5bef9537

  • SHA256

    ca066896a28840f4eccb9150adf86170d83337650d28b128cb584e7d8b178695

  • SHA512

    4fdf90883f5fde3aeb02b2ddc46c5e3cd421fe98697aca0d31b1aaea39598d2624c3339ab75a96997287c611a7d4dd8459b1c3341fe972cf049885d22c31f3de

  • SSDEEP

    24576:U7fGyyeUW7jK9ijzqPoKQ+2L7uUgtAsjxy5U2dTfUpHkKBdsQM+WAM7W:OfFU2m9ijzWoK0zgtAsI5U2dTfAHowQW

Score
10/10

Malware Config

Targets

    • Target

      app.com

    • Size

      1.5MB

    • MD5

      bd3231011448b2d6a335032d11c12cad

    • SHA1

      b14bdeccca499668fac5049890bb7f3e5bef9537

    • SHA256

      ca066896a28840f4eccb9150adf86170d83337650d28b128cb584e7d8b178695

    • SHA512

      4fdf90883f5fde3aeb02b2ddc46c5e3cd421fe98697aca0d31b1aaea39598d2624c3339ab75a96997287c611a7d4dd8459b1c3341fe972cf049885d22c31f3de

    • SSDEEP

      24576:U7fGyyeUW7jK9ijzqPoKQ+2L7uUgtAsjxy5U2dTfUpHkKBdsQM+WAM7W:OfFU2m9ijzWoK0zgtAsI5U2dTfAHowQW

    Score
    10/10
    • SSLoad

      SSLoad Unpacked DLL payload.

    • Detects SSLoad Unpacked payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks