General

  • Target

    Vanity.exe

  • Size

    90.5MB

  • Sample

    240727-f9gfjasfpd

  • MD5

    0b6fe0b6d2ace9c9c4f32b2901adfce6

  • SHA1

    87358a921b73e55e3a7429981db948d3a82a5804

  • SHA256

    8d3ab8890d9e1484908d0b1b12cb252895362d0f0561eff8221c7351c0d2b841

  • SHA512

    b540eb1cc6963c33e9ef59a7a753527bdd3f1e734d20cfab5facef5920e0b45c70496c5112f70932c2b5d13052cfcd9d1d982a003b029d348627bc77116b7088

  • SSDEEP

    1572864:i3jUJXPU1e4iamkhLDyPlEwLQA//7v0QqMrlpA+fl4QkvIUD/wlWn9L0b3mOAgp:yjUJX4e4iadhLDy9LLN3Yyjl/kvDol8w

Score
7/10

Malware Config

Targets

    • Target

      Vanity.exe

    • Size

      90.5MB

    • MD5

      0b6fe0b6d2ace9c9c4f32b2901adfce6

    • SHA1

      87358a921b73e55e3a7429981db948d3a82a5804

    • SHA256

      8d3ab8890d9e1484908d0b1b12cb252895362d0f0561eff8221c7351c0d2b841

    • SHA512

      b540eb1cc6963c33e9ef59a7a753527bdd3f1e734d20cfab5facef5920e0b45c70496c5112f70932c2b5d13052cfcd9d1d982a003b029d348627bc77116b7088

    • SSDEEP

      1572864:i3jUJXPU1e4iamkhLDyPlEwLQA//7v0QqMrlpA+fl4QkvIUD/wlWn9L0b3mOAgp:yjUJX4e4iadhLDy9LLN3Yyjl/kvDol8w

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Command and Control

Web Service

1
T1102

Tasks