General

  • Target

    8e4e7d9e9531cc8c334170fd9665a790N.exe

  • Size

    76KB

  • Sample

    240715-f4ls3azejk

  • MD5

    8e4e7d9e9531cc8c334170fd9665a790

  • SHA1

    3af3bb55473b95f00289174ad646b12b81cf4277

  • SHA256

    a5115eb349799e30dd7cf4cf7102d6ec72644766bb5b9fd6ae7024d32379d00a

  • SHA512

    e1bd0786bc24c410208d419853f4f6d4f310a96a1d4bc35bc53ad72fa05d3e098dfc53122acbc5cb67757ef1a00d3d7caa023017a1dcf837731afdf7818e0af6

  • SSDEEP

    1536:DrpAO/e7UsllFYPMHXYuLaOVTKEigiYY6NzKLPSjC4sA:xAO/e7USuOVTKEigoq

Score
7/10

Malware Config

Targets

    • Target

      8e4e7d9e9531cc8c334170fd9665a790N.exe

    • Size

      76KB

    • MD5

      8e4e7d9e9531cc8c334170fd9665a790

    • SHA1

      3af3bb55473b95f00289174ad646b12b81cf4277

    • SHA256

      a5115eb349799e30dd7cf4cf7102d6ec72644766bb5b9fd6ae7024d32379d00a

    • SHA512

      e1bd0786bc24c410208d419853f4f6d4f310a96a1d4bc35bc53ad72fa05d3e098dfc53122acbc5cb67757ef1a00d3d7caa023017a1dcf837731afdf7818e0af6

    • SSDEEP

      1536:DrpAO/e7UsllFYPMHXYuLaOVTKEigiYY6NzKLPSjC4sA:xAO/e7USuOVTKEigoq

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks