General

  • Target

    main.exe

  • Size

    23.6MB

  • Sample

    241009-qfjnxazcmd

  • MD5

    5396030e6521e5a5a84a142e794a08e8

  • SHA1

    dd0e5fd815470e2c3066860cb9031f26bee92343

  • SHA256

    60799b1c67a5900f8e38d8ddcf175aa74ccad56a29622a619e5b589c7620dbe2

  • SHA512

    cc999d94463d249f5de2e2ca2ddbd72de6ab1bb8330484c744e89783c73261a75a9063bf554f212e4db3758f851d24c82bdfd18c8f997df27b581c1a409afdf7

  • SSDEEP

    393216:sqPnLFXlrKpwde9TQDyRTDOETgsvcGHrg9/MMxVILJyIpDbujLi7ZiUqPNJ0:dPLFXNKdQDyAENNMxiBAfOuQ

Malware Config

Targets

    • Target

      main.exe

    • Size

      23.6MB

    • MD5

      5396030e6521e5a5a84a142e794a08e8

    • SHA1

      dd0e5fd815470e2c3066860cb9031f26bee92343

    • SHA256

      60799b1c67a5900f8e38d8ddcf175aa74ccad56a29622a619e5b589c7620dbe2

    • SHA512

      cc999d94463d249f5de2e2ca2ddbd72de6ab1bb8330484c744e89783c73261a75a9063bf554f212e4db3758f851d24c82bdfd18c8f997df27b581c1a409afdf7

    • SSDEEP

      393216:sqPnLFXlrKpwde9TQDyRTDOETgsvcGHrg9/MMxVILJyIpDbujLi7ZiUqPNJ0:dPLFXNKdQDyAENNMxiBAfOuQ

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks