General

  • Target

    e7283aca995d1e717d6127275f06e142df3ffdbed0c81644e90752b2c7fa7175.exe

  • Size

    1.1MB

  • Sample

    241016-gerhpavgqb

  • MD5

    a7cc45751631476c0701cf2d29bb14e6

  • SHA1

    47aec3abcc88d485d4da20beaceab3d6c0dcad84

  • SHA256

    e7283aca995d1e717d6127275f06e142df3ffdbed0c81644e90752b2c7fa7175

  • SHA512

    2ca1624966693f00805b24b69949be5bcb8935eaae7376598edae6ed665b8f7672664d359126ad96968fc7eaf93f576469eea7a18033910adcfe551177db56a0

  • SSDEEP

    24576:WfmMv6Ckr7Mny5QtzD849cYVOuju9D7jq3jbLW:W3v+7/5QtzDfVEAu176LW

Score
7/10

Malware Config

Targets

    • Target

      e7283aca995d1e717d6127275f06e142df3ffdbed0c81644e90752b2c7fa7175.exe

    • Size

      1.1MB

    • MD5

      a7cc45751631476c0701cf2d29bb14e6

    • SHA1

      47aec3abcc88d485d4da20beaceab3d6c0dcad84

    • SHA256

      e7283aca995d1e717d6127275f06e142df3ffdbed0c81644e90752b2c7fa7175

    • SHA512

      2ca1624966693f00805b24b69949be5bcb8935eaae7376598edae6ed665b8f7672664d359126ad96968fc7eaf93f576469eea7a18033910adcfe551177db56a0

    • SSDEEP

      24576:WfmMv6Ckr7Mny5QtzD849cYVOuju9D7jq3jbLW:W3v+7/5QtzDfVEAu176LW

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks