General

  • Target

    Payment_Advice_Note_Ucas.html

  • Size

    5KB

  • Sample

    240605-plpxfafc7v

  • MD5

    435aecd7330c0a36a0e0a428d5dce525

  • SHA1

    66ef45999cfffe3aeeaa9f6d2775b2493755591e

  • SHA256

    efdcddca2b090163914c9807a035642d0a8d9690d53f0b566799a42875aa617f

  • SHA512

    dcd04bc42758aa1f226b6d231ed4196bd9a23e0eeabd232906dffc0b27f57864c083c3f0dff059b09d94e7bcd9fd3524933f76acfd7f622897fd97dbe85d61ea

  • SSDEEP

    48:1h7/NlDLUsZyuSl+pEoLLjEFVZbV2Fh82T6gM0UtY54lNq4iypq97quYWDmpnWfZ:1hJVXZxTjQW6gMtO70tWfCMPRdkKN

Score
6/10

Malware Config

Targets

    • Target

      Payment_Advice_Note_Ucas.html

    • Size

      5KB

    • MD5

      435aecd7330c0a36a0e0a428d5dce525

    • SHA1

      66ef45999cfffe3aeeaa9f6d2775b2493755591e

    • SHA256

      efdcddca2b090163914c9807a035642d0a8d9690d53f0b566799a42875aa617f

    • SHA512

      dcd04bc42758aa1f226b6d231ed4196bd9a23e0eeabd232906dffc0b27f57864c083c3f0dff059b09d94e7bcd9fd3524933f76acfd7f622897fd97dbe85d61ea

    • SSDEEP

      48:1h7/NlDLUsZyuSl+pEoLLjEFVZbV2Fh82T6gM0UtY54lNq4iypq97quYWDmpnWfZ:1hJVXZxTjQW6gMtO70tWfCMPRdkKN

    Score
    6/10
    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks