General

  • Target

    877ec78b3be00bd70b0d98c0d40ffcb8210f47c92fb07e25ee76699d69a37c3b

  • Size

    236KB

  • Sample

    240614-3fvsdsvakp

  • MD5

    f28dd20ddb8e68fac769457385c7dfa4

  • SHA1

    70ba64b417e6f2046caa91de98181c266943b609

  • SHA256

    877ec78b3be00bd70b0d98c0d40ffcb8210f47c92fb07e25ee76699d69a37c3b

  • SHA512

    7ede34cf06a577eb74075bc067404d6abe2764809b5c442d50ee6e5df7fd6b5a24a9c40256c8c1e87ed34bdf54be8e476dbf360e1fbc192ddbf7c7b04b97cfe7

  • SSDEEP

    3072:9ePgCctxGv4QcU9KQ2BBA2waPxPtmolAQAHyuIuF8IYj:BCctxGsWKQ2Bx5xF8QArIS8I2

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      877ec78b3be00bd70b0d98c0d40ffcb8210f47c92fb07e25ee76699d69a37c3b

    • Size

      236KB

    • MD5

      f28dd20ddb8e68fac769457385c7dfa4

    • SHA1

      70ba64b417e6f2046caa91de98181c266943b609

    • SHA256

      877ec78b3be00bd70b0d98c0d40ffcb8210f47c92fb07e25ee76699d69a37c3b

    • SHA512

      7ede34cf06a577eb74075bc067404d6abe2764809b5c442d50ee6e5df7fd6b5a24a9c40256c8c1e87ed34bdf54be8e476dbf360e1fbc192ddbf7c7b04b97cfe7

    • SSDEEP

      3072:9ePgCctxGv4QcU9KQ2BBA2waPxPtmolAQAHyuIuF8IYj:BCctxGsWKQ2Bx5xF8QArIS8I2

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks