General

  • Target

    TikTok Method.exe

  • Size

    63.2MB

  • Sample

    240821-1lex1ssbpc

  • MD5

    aa2248ed687b98b3d4a2f3ef31d5b00c

  • SHA1

    44f833c368ed36e9a8a29dd66762fb31229b2fec

  • SHA256

    82c9e5251b36473d57438d622886412cd697259e4083554b87d1b2de75ad8a3d

  • SHA512

    a8aff585e164dcf94654742fe22a1d69adaf86e270bd7c39848ab362f572c6ee0c9cd4f83d4678afc93472e79b0af2ff1a1fa6d51f5e09e0f7696267b7909519

  • SSDEEP

    1572864:BAOQ27vFQqMrlpA+Ql4WH5GvIxlqrSa+Rdl:BAOvJyklnQvALh

Score
7/10
upx

Malware Config

Targets

    • Target

      TikTok Method.exe

    • Size

      63.2MB

    • MD5

      aa2248ed687b98b3d4a2f3ef31d5b00c

    • SHA1

      44f833c368ed36e9a8a29dd66762fb31229b2fec

    • SHA256

      82c9e5251b36473d57438d622886412cd697259e4083554b87d1b2de75ad8a3d

    • SHA512

      a8aff585e164dcf94654742fe22a1d69adaf86e270bd7c39848ab362f572c6ee0c9cd4f83d4678afc93472e79b0af2ff1a1fa6d51f5e09e0f7696267b7909519

    • SSDEEP

      1572864:BAOQ27vFQqMrlpA+Ql4WH5GvIxlqrSa+Rdl:BAOvJyklnQvALh

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      loader-o.pyc

    • Size

      366KB

    • MD5

      d46cb66e4f66e2a2041c5e870e080181

    • SHA1

      79b9f8512f726795213e10fb6dea895a1fbf098c

    • SHA256

      ee61f3072d98c6b38e5903daeabd9af4861586535b161d8ed7759943658d8f28

    • SHA512

      42bf30be8f6617aaaf4129399c3938e0c50c7d5f4c5f3a1d1f0445d541547c7146c345fcf91136be995fad851f3996a888f8d904070141a1c3041c1914cbd768

    • SSDEEP

      1536:ItGqnkQwpgSusvkmygTsv81plvyFctFqVlUAzHTK+ZSLir0rY7Kp5ShlUbYXYzbl:I/nQrQCs2KvTfyInh1QPAWB

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks