General

  • Target

    f69df180e226f33833e2e64a9dac54789d6d0e2fec9ca83e56e3b0694fdbf61b.exe

  • Size

    10KB

  • Sample

    240510-cfj3sacd61

  • MD5

    93d0df7843fc55634ae8c9cd9f329fed

  • SHA1

    abbb5643fbc3bc2f20dd1d30b5b8c87e64d0f559

  • SHA256

    f69df180e226f33833e2e64a9dac54789d6d0e2fec9ca83e56e3b0694fdbf61b

  • SHA512

    bb19f9c1533381515834b6b37989d9da4ca5f8c8e1bd9bae63743bf0b54a7fb1d0965ab19ef480304f619f0afd4e33b3ab2165d036997d98e678bd5228207473

  • SSDEEP

    96:3JVISW4jNWj7+PaMpm612gMcS6BNiIjHwKayc7jcTA+1bFNjfBYlEFt3z0sqWVaM:hW4W+PZX5M5GNBEKpA+1K+U4VaNEjL

Score
10/10

Malware Config

Targets

    • Target

      f69df180e226f33833e2e64a9dac54789d6d0e2fec9ca83e56e3b0694fdbf61b.exe

    • Size

      10KB

    • MD5

      93d0df7843fc55634ae8c9cd9f329fed

    • SHA1

      abbb5643fbc3bc2f20dd1d30b5b8c87e64d0f559

    • SHA256

      f69df180e226f33833e2e64a9dac54789d6d0e2fec9ca83e56e3b0694fdbf61b

    • SHA512

      bb19f9c1533381515834b6b37989d9da4ca5f8c8e1bd9bae63743bf0b54a7fb1d0965ab19ef480304f619f0afd4e33b3ab2165d036997d98e678bd5228207473

    • SSDEEP

      96:3JVISW4jNWj7+PaMpm612gMcS6BNiIjHwKayc7jcTA+1bFNjfBYlEFt3z0sqWVaM:hW4W+PZX5M5GNBEKpA+1K+U4VaNEjL

    Score
    9/10
    • Detects executables Discord URL observed in first stage droppers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks