General

  • Target

    8f8ee260ee81583cdd8560b7b7d4cee0N

  • Size

    35KB

  • Sample

    240912-m7psfsshjq

  • MD5

    8f8ee260ee81583cdd8560b7b7d4cee0

  • SHA1

    3b438e82cf02cb7cecfac335d0913773c8a6ec31

  • SHA256

    e9f404dba4a3efb9c77a6797ac84430675b88adf8ee20e912288c0072011a1e1

  • SHA512

    ac283c5eba10dfe7e52db1b28124f9584d71c62408b0805ff5bc7eda0926a7ea879e0954e81793f4faab864202946f390025b9f58c9c51abaa055f40c23c24d0

  • SSDEEP

    768:9qSqC8+N5ozQQsncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXySrB:9rqfzQQsamN88Fr277777L

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      8f8ee260ee81583cdd8560b7b7d4cee0N

    • Size

      35KB

    • MD5

      8f8ee260ee81583cdd8560b7b7d4cee0

    • SHA1

      3b438e82cf02cb7cecfac335d0913773c8a6ec31

    • SHA256

      e9f404dba4a3efb9c77a6797ac84430675b88adf8ee20e912288c0072011a1e1

    • SHA512

      ac283c5eba10dfe7e52db1b28124f9584d71c62408b0805ff5bc7eda0926a7ea879e0954e81793f4faab864202946f390025b9f58c9c51abaa055f40c23c24d0

    • SSDEEP

      768:9qSqC8+N5ozQQsncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXySrB:9rqfzQQsamN88Fr277777L

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks