General

  • Target

    d5ca4a602c9711705f065be643e3eac5dad5e7cfbfaa0dcc8e10e21bfd1535b9N

  • Size

    58KB

  • Sample

    241003-12r8aasgjf

  • MD5

    bbf6513fb2d461e723b4c740f10995c0

  • SHA1

    249b4a23201e45872e10a311cd0fe4a3b49ec981

  • SHA256

    d5ca4a602c9711705f065be643e3eac5dad5e7cfbfaa0dcc8e10e21bfd1535b9

  • SHA512

    7e3e8b66f7bc0b29a482144144da0de081c7b469c68a3a82e7f38603f3b5f516bb8d5a04342a5b4b4eb0c82f8427867e60e66ad80557ba0266674a4443101598

  • SSDEEP

    1536:gQTIubHy5wQkJAejpzkGdxDLw3qMnd2wrt5:R4wPZpzNdxDL252kt5

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      d5ca4a602c9711705f065be643e3eac5dad5e7cfbfaa0dcc8e10e21bfd1535b9N

    • Size

      58KB

    • MD5

      bbf6513fb2d461e723b4c740f10995c0

    • SHA1

      249b4a23201e45872e10a311cd0fe4a3b49ec981

    • SHA256

      d5ca4a602c9711705f065be643e3eac5dad5e7cfbfaa0dcc8e10e21bfd1535b9

    • SHA512

      7e3e8b66f7bc0b29a482144144da0de081c7b469c68a3a82e7f38603f3b5f516bb8d5a04342a5b4b4eb0c82f8427867e60e66ad80557ba0266674a4443101598

    • SSDEEP

      1536:gQTIubHy5wQkJAejpzkGdxDLw3qMnd2wrt5:R4wPZpzNdxDL252kt5

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks