General

  • Target

    tor-browser-windows-x86_64-portable-13.5.5.exe

  • Size

    100.6MB

  • Sample

    240930-lq97dsshjb

  • MD5

    36a40aee3e6d6593fadca9045667c90f

  • SHA1

    60afa4dfc903e70fc8565e6bac27d9531ef02056

  • SHA256

    90b6356f6a01735efd303d36083cfeaac276f1528177328e71a941255b2c133b

  • SHA512

    0a2b945ad620bd1c849b8ba5d2f617cdafedd02b76e5c982cc1d2603093c0572ab27190c7b0781f06e8810ee6f3f30543a6713d2466d907fc24956004180cf17

  • SSDEEP

    3145728:Kbo9rYX+vF1hWIaeQRht9HKIJoo7qfSHL1:Kb2cutfWIKntpKImo+SHZ

Malware Config

Targets

    • Target

      tor-browser-windows-x86_64-portable-13.5.5.exe

    • Size

      100.6MB

    • MD5

      36a40aee3e6d6593fadca9045667c90f

    • SHA1

      60afa4dfc903e70fc8565e6bac27d9531ef02056

    • SHA256

      90b6356f6a01735efd303d36083cfeaac276f1528177328e71a941255b2c133b

    • SHA512

      0a2b945ad620bd1c849b8ba5d2f617cdafedd02b76e5c982cc1d2603093c0572ab27190c7b0781f06e8810ee6f3f30543a6713d2466d907fc24956004180cf17

    • SSDEEP

      3145728:Kbo9rYX+vF1hWIaeQRht9HKIJoo7qfSHL1:Kb2cutfWIKntpKImo+SHZ

    • Contacts a large (527) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks