General

  • Target

    GalacticaExecutorV1.exe

  • Size

    21.7MB

  • Sample

    240606-s1396aga3w

  • MD5

    d66c8542dc1d4af1980daef723654440

  • SHA1

    72bb308c65b07bdd5215b6300171d3b5fb77059d

  • SHA256

    0b39417fb97277fc156c39c752bf6c415f3040462825e46df064bcbca1361ab1

  • SHA512

    69dee5f56e9571b928efcc8a715709070887ff1526c4399db9a143d6a6360b880fda2866dacd818c0d077541ab5021b371ad3ba500a2f9883ba6051c58be808c

  • SSDEEP

    393216:VqPnLFXlrFWmQZyRTDOETgsvcGycgThK4pWpIYIvtZFm05NRs:MPLFXNFRQZyAELs4fq006

Malware Config

Targets

    • Target

      GalacticaExecutorV1.exe

    • Size

      21.7MB

    • MD5

      d66c8542dc1d4af1980daef723654440

    • SHA1

      72bb308c65b07bdd5215b6300171d3b5fb77059d

    • SHA256

      0b39417fb97277fc156c39c752bf6c415f3040462825e46df064bcbca1361ab1

    • SHA512

      69dee5f56e9571b928efcc8a715709070887ff1526c4399db9a143d6a6360b880fda2866dacd818c0d077541ab5021b371ad3ba500a2f9883ba6051c58be808c

    • SSDEEP

      393216:VqPnLFXlrFWmQZyRTDOETgsvcGycgThK4pWpIYIvtZFm05NRs:MPLFXNFRQZyAELs4fq006

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks