General

  • Target

    7061b30b5149580437562434433838a99408c18e3447040f39029c4ada7defd8N

  • Size

    42KB

  • Sample

    240920-kz8t9aydje

  • MD5

    0f64ae35c66d97fc89ef34fa763d88d0

  • SHA1

    329bb2a068c3f88359ffc34fc6a2954f4cb3b18d

  • SHA256

    7061b30b5149580437562434433838a99408c18e3447040f39029c4ada7defd8

  • SHA512

    49ca0be2c4fa7e5052a61440cbdf67dff51f4d071f13c4e49007c233fa75f6531618b04867e2966a6ab64f42ad40e5e9224f5e3a93b22bc48cda6e6e92459963

  • SSDEEP

    768:TzQYScGrIubHuYtvdxwYHw5FAe2QkncwxI4KJfYfUACyg:3QTIubHy5wQks4KJfYfnCl

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      7061b30b5149580437562434433838a99408c18e3447040f39029c4ada7defd8N

    • Size

      42KB

    • MD5

      0f64ae35c66d97fc89ef34fa763d88d0

    • SHA1

      329bb2a068c3f88359ffc34fc6a2954f4cb3b18d

    • SHA256

      7061b30b5149580437562434433838a99408c18e3447040f39029c4ada7defd8

    • SHA512

      49ca0be2c4fa7e5052a61440cbdf67dff51f4d071f13c4e49007c233fa75f6531618b04867e2966a6ab64f42ad40e5e9224f5e3a93b22bc48cda6e6e92459963

    • SSDEEP

      768:TzQYScGrIubHuYtvdxwYHw5FAe2QkncwxI4KJfYfUACyg:3QTIubHy5wQks4KJfYfnCl

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks