General

  • Target

    hit.exe

  • Size

    11.5MB

  • Sample

    240524-ex8htada25

  • MD5

    f0daab154ec89069de0a683afc8c6d89

  • SHA1

    1d36cd1d3c776477e7456aa21f9f93e836ae85fa

  • SHA256

    725d2aaaf1c6f202f7022562beb2fcf9394f3672791ff024ead561cea52b8764

  • SHA512

    58ac7906fba205c705578c6c1b59240da0957a7ff31c193833b7a6953f400751933219526c39efba03ce8edf5afcf743c5c39319d7b6b5c2523dafba3e438531

  • SSDEEP

    196608:ksVg9ggdqPuXJWIj8KkUx2R4NzhA1HeT39IigwCeE9TFa0Z8DOjCdylfUQRjQTGt:agg4UJWQsUcR4NzK1+TtIiFPY9Z8D8CU

Score
7/10

Malware Config

Targets

    • Target

      hit.exe

    • Size

      11.5MB

    • MD5

      f0daab154ec89069de0a683afc8c6d89

    • SHA1

      1d36cd1d3c776477e7456aa21f9f93e836ae85fa

    • SHA256

      725d2aaaf1c6f202f7022562beb2fcf9394f3672791ff024ead561cea52b8764

    • SHA512

      58ac7906fba205c705578c6c1b59240da0957a7ff31c193833b7a6953f400751933219526c39efba03ce8edf5afcf743c5c39319d7b6b5c2523dafba3e438531

    • SSDEEP

      196608:ksVg9ggdqPuXJWIj8KkUx2R4NzhA1HeT39IigwCeE9TFa0Z8DOjCdylfUQRjQTGt:agg4UJWQsUcR4NzK1+TtIiFPY9Z8D8CU

    Score
    7/10
    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      hit.pyc

    • Size

      39KB

    • MD5

      ac1255f08377c1f99ae8ad3aa11cc125

    • SHA1

      ce753f5e9901974ff12f93d2d1e15a2e8b4fe4ce

    • SHA256

      a8de917bafd139eef00f547143494870955d602bf29c9e22420b81aab07548a6

    • SHA512

      19780f4d3f5761ddc038fc2a68a623d2be82f7ba5fb3f173871a3bdea5bf91e06332411564e63058018b93277a40c8e91c327ed46fba92839b90d791c0fd0eaa

    • SSDEEP

      768:X1cOh3bNIIq/chxAb5vl7mFkR9XXZA5NhgZ5S3:XxrNEETA7mwC5Nh+I3

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks