General

  • Target

    e000facb90b4caf0a32df9269ca87b90N.exe

  • Size

    52KB

  • Sample

    240725-tjr18ssfla

  • MD5

    e000facb90b4caf0a32df9269ca87b90

  • SHA1

    e6fe48f221cf36e6dd311be64dc0ee797e1bdde1

  • SHA256

    ad96608e144dc4b8068039a3afe676b03510620fc0ba170df9547dd581706678

  • SHA512

    c476aaec3e76aa5bc2ad7a17afdd36694148b22b36bd61ccb5a991e4a607251caa6fc63c022a0cf8ff3da61d9d900e158cd2a317d9b8495880b1252231dd12a6

  • SSDEEP

    768:F/iz5Bnot34ebWtpDxP3X4GdAk4U+eCXwmKwisuo:FIPnotIUWtpDxfX4GdAk4U+eCzKrsR

Score
7/10

Malware Config

Targets

    • Target

      e000facb90b4caf0a32df9269ca87b90N.exe

    • Size

      52KB

    • MD5

      e000facb90b4caf0a32df9269ca87b90

    • SHA1

      e6fe48f221cf36e6dd311be64dc0ee797e1bdde1

    • SHA256

      ad96608e144dc4b8068039a3afe676b03510620fc0ba170df9547dd581706678

    • SHA512

      c476aaec3e76aa5bc2ad7a17afdd36694148b22b36bd61ccb5a991e4a607251caa6fc63c022a0cf8ff3da61d9d900e158cd2a317d9b8495880b1252231dd12a6

    • SSDEEP

      768:F/iz5Bnot34ebWtpDxP3X4GdAk4U+eCXwmKwisuo:FIPnotIUWtpDxfX4GdAk4U+eCzKrsR

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks