General

  • Target

    4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130

  • Size

    114KB

  • Sample

    240515-1pqhxsea78

  • MD5

    9997673d0012bfe55bc2082b33bce79c

  • SHA1

    f55da708a244d9cee79efafa34d49464e95da720

  • SHA256

    4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130

  • SHA512

    94ad170294f59a50a343b04245a52fc992150a1a49704b5e7b676ed7a91a714f7f231358fa334b2907ab305bf6fb1da97ee6a1bb06224a781cd3cd9c3fbbad5c

  • SSDEEP

    768:3x/5inm+cd5rHemPXKqUEphjVuvios1rPr4adL0NqlJMU6wiK1rEKlcIQ1TTGfoX:3xRsvcdCQjosnvnZ6grfQ1b4U

Score
10/10
upx

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Targets

    • Target

      4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130

    • Size

      114KB

    • MD5

      9997673d0012bfe55bc2082b33bce79c

    • SHA1

      f55da708a244d9cee79efafa34d49464e95da720

    • SHA256

      4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130

    • SHA512

      94ad170294f59a50a343b04245a52fc992150a1a49704b5e7b676ed7a91a714f7f231358fa334b2907ab305bf6fb1da97ee6a1bb06224a781cd3cd9c3fbbad5c

    • SSDEEP

      768:3x/5inm+cd5rHemPXKqUEphjVuvios1rPr4adL0NqlJMU6wiK1rEKlcIQ1TTGfoX:3xRsvcdCQjosnvnZ6grfQ1b4U

    Score
    10/10
    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks