General

  • Target

    2024-04-18-SSLoad-DLL.dll

  • Size

    1.8MB

  • Sample

    240619-wye2bswbpb

  • MD5

    ca303668b5420c022ef9c78ce1f2bfb7

  • SHA1

    959a727b907b395aec2b05e5892e2bf78cb5544b

  • SHA256

    73774861d946d62c2105fef4718683796cb77de7ed42edaec7affcee5eb0a0ee

  • SHA512

    a550f4f0487b0467ebf8827fa336c57368fe9debb68cda0b8b3f486d5189a5bbe1ed4c42ae4a6effc60dd6f5f65c6fef6e7ea9592aef2c121f9babc252c37c4d

  • SSDEEP

    49152:XasPOtjnq0Fx47oxpxuZZFIGkTagevclh:XasPUjnqKIodcZYeTvclh

Score
10/10

Malware Config

Targets

    • Target

      2024-04-18-SSLoad-DLL.dll

    • Size

      1.8MB

    • MD5

      ca303668b5420c022ef9c78ce1f2bfb7

    • SHA1

      959a727b907b395aec2b05e5892e2bf78cb5544b

    • SHA256

      73774861d946d62c2105fef4718683796cb77de7ed42edaec7affcee5eb0a0ee

    • SHA512

      a550f4f0487b0467ebf8827fa336c57368fe9debb68cda0b8b3f486d5189a5bbe1ed4c42ae4a6effc60dd6f5f65c6fef6e7ea9592aef2c121f9babc252c37c4d

    • SSDEEP

      49152:XasPOtjnq0Fx47oxpxuZZFIGkTagevclh:XasPUjnqKIodcZYeTvclh

    Score
    10/10
    • SSLoad

      SSLoad Unpacked DLL payload.

    • Detects SSLoad Unpacked payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Tasks