General

  • Target

    89a1733728bdb676b5968fe2ed1c18059bf42f8272b0380850415315dcc80666N

  • Size

    94KB

  • Sample

    240920-emywmaxfke

  • MD5

    38ca6af6829c1e886f9d6110d096a5d0

  • SHA1

    f3052bcb24e3b67e4a3eabe3c5a0d26b5b10f972

  • SHA256

    89a1733728bdb676b5968fe2ed1c18059bf42f8272b0380850415315dcc80666

  • SHA512

    25e60b867e09b19bd86d1af5e7cf65841be38810f8545e3c49db0a4aef693aac68291f2d8d6d55f9f8a8579c54f6ddea6826f72885f746117ac0fdbdfc8f5e14

  • SSDEEP

    1536:KhSwVt0N0k74r8nBo+FbD05gjkX8edia+CDmnRCbn5a3yhRJAHXtNA6U/yY8hQzk:PwVSN0IHBoefc584BZnnIrHXtF6Chgk

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      89a1733728bdb676b5968fe2ed1c18059bf42f8272b0380850415315dcc80666N

    • Size

      94KB

    • MD5

      38ca6af6829c1e886f9d6110d096a5d0

    • SHA1

      f3052bcb24e3b67e4a3eabe3c5a0d26b5b10f972

    • SHA256

      89a1733728bdb676b5968fe2ed1c18059bf42f8272b0380850415315dcc80666

    • SHA512

      25e60b867e09b19bd86d1af5e7cf65841be38810f8545e3c49db0a4aef693aac68291f2d8d6d55f9f8a8579c54f6ddea6826f72885f746117ac0fdbdfc8f5e14

    • SSDEEP

      1536:KhSwVt0N0k74r8nBo+FbD05gjkX8edia+CDmnRCbn5a3yhRJAHXtNA6U/yY8hQzk:PwVSN0IHBoefc584BZnnIrHXtF6Chgk

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks