General

  • Target

    s.exe

  • Size

    17.9MB

  • Sample

    241027-1by8xasgrg

  • MD5

    1c5905bc7f4728046ae14334a1870e3f

  • SHA1

    ab091d19596b8cc7a56457da58c78fa4c1262daf

  • SHA256

    62e6c675e0a8e1b646b5408d05c10f924fb7745c89ed3b2e8638ffa8f23a52ef

  • SHA512

    549b194c3c70ca73a937af49744aeddc5f8c645ed0d71b089f10b04d0a70a24846d3929c9f9535fb930a8a34b00688d42fb0c2d1c881230556a2e59e1b705c87

  • SSDEEP

    393216:sqPnLFXlrzQMDOETgsvfGpgq4266vEsvkw2lvq:dPLFXNzQRE8D426T3wD

Malware Config

Targets

    • Target

      s.exe

    • Size

      17.9MB

    • MD5

      1c5905bc7f4728046ae14334a1870e3f

    • SHA1

      ab091d19596b8cc7a56457da58c78fa4c1262daf

    • SHA256

      62e6c675e0a8e1b646b5408d05c10f924fb7745c89ed3b2e8638ffa8f23a52ef

    • SHA512

      549b194c3c70ca73a937af49744aeddc5f8c645ed0d71b089f10b04d0a70a24846d3929c9f9535fb930a8a34b00688d42fb0c2d1c881230556a2e59e1b705c87

    • SSDEEP

      393216:sqPnLFXlrzQMDOETgsvfGpgq4266vEsvkw2lvq:dPLFXNzQRE8D426T3wD

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks