General

  • Target

    d79afa353482670125e2487faaa29d3764946962edd4dce25405621ca33d2131

  • Size

    70KB

  • Sample

    240920-a816na1apm

  • MD5

    dc10378d30c7641b5b996cc2f06df461

  • SHA1

    547522b70b8415d735e6b7e20422fbe8e44497db

  • SHA256

    d79afa353482670125e2487faaa29d3764946962edd4dce25405621ca33d2131

  • SHA512

    8b0938b0dd022cf8943dd4a37617e369776cf5450343a172725509c136a36c6428f48c68cfab20e59b98cf36770c92b059df18ee92cb90a61b91fcaaf24403da

  • SSDEEP

    768:u/pinm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJfU60+ppQ1TTGfLAZN:uxsvcdcQjosnvnc6LQ1E2N

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Targets

    • Target

      d79afa353482670125e2487faaa29d3764946962edd4dce25405621ca33d2131

    • Size

      70KB

    • MD5

      dc10378d30c7641b5b996cc2f06df461

    • SHA1

      547522b70b8415d735e6b7e20422fbe8e44497db

    • SHA256

      d79afa353482670125e2487faaa29d3764946962edd4dce25405621ca33d2131

    • SHA512

      8b0938b0dd022cf8943dd4a37617e369776cf5450343a172725509c136a36c6428f48c68cfab20e59b98cf36770c92b059df18ee92cb90a61b91fcaaf24403da

    • SSDEEP

      768:u/pinm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJfU60+ppQ1TTGfLAZN:uxsvcdcQjosnvnc6LQ1E2N

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks