General

  • Target

    winmm.dll

  • Size

    841KB

  • Sample

    241011-whk8eavfqe

  • MD5

    d6a8c7fd490cd1149c0b51d961eab9f3

  • SHA1

    73bb1220ead897fcc36df8d8622104ae82a9ad12

  • SHA256

    119f71276feb0064a7382ae036cc9a7ef9a2cdef69f8b4ca65a0e0ce4643245a

  • SHA512

    0273f74c072f48a3aaac1c6e808fcdcab465513651c5a7815fc75e767af85cd1654073f776a5f41ad2d9606264302333d4524cbe838dacfeae1e1d7ff413befc

  • SSDEEP

    6144:oUCLuxLYxYooT5WjKkwxPQm9msflBOkV4ELEko/q+EIZtCn6Kyn3KzhJTTcAcYGR:TCv/o9rk8597u/PHvLKkAS84RQ8MoJ

Malware Config

Extracted

Family

legion

C2

dns-beast.com

Attributes
  • url_paths

    hittest.php

  • user_agent

    Mozilla/5.0 (Windows NT 6.3; Trident/7.0; Touch; rv:11.0) like Gecko

Targets

    • Target

      winmm.dll

    • Size

      841KB

    • MD5

      d6a8c7fd490cd1149c0b51d961eab9f3

    • SHA1

      73bb1220ead897fcc36df8d8622104ae82a9ad12

    • SHA256

      119f71276feb0064a7382ae036cc9a7ef9a2cdef69f8b4ca65a0e0ce4643245a

    • SHA512

      0273f74c072f48a3aaac1c6e808fcdcab465513651c5a7815fc75e767af85cd1654073f776a5f41ad2d9606264302333d4524cbe838dacfeae1e1d7ff413befc

    • SSDEEP

      6144:oUCLuxLYxYooT5WjKkwxPQm9msflBOkV4ELEko/q+EIZtCn6Kyn3KzhJTTcAcYGR:TCv/o9rk8597u/PHvLKkAS84RQ8MoJ

    • Legion, RobotDropper, Satacom

      Legion aka 'RobotDropper' or 'Satacom' is a malware downloader written in C++ and Legion stealer is written C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.