General

  • Target

    sample

  • Size

    20KB

  • Sample

    241027-ay7wfssclm

  • MD5

    d4ddd3e7f66971b9513fb72fa7fa1abd

  • SHA1

    5d4d0cea3347442231d216b32ee8a4c5f488cc29

  • SHA256

    1b992921c84a2bdb2aaae2b5d04ecce54ff58a3c5abc4b2686e879a72d79eb65

  • SHA512

    d1642225996a8dc62f5ba479082c9d10cbc2aeade71262fc95400bbb3637790c206b61395d00c7ce988dbb8c61d11eb078445cb2610f4071574286b2f90e004b

  • SSDEEP

    384:0TEW6VvWspa1ocy4F4lbGal7vhpNWH8B0nPro2REu4Y0wM1OTf41xCejiw:661o1ocy4GEa5JpNE8qnPrEu4Y0wM12q

Malware Config

Targets

    • Target

      sample

    • Size

      20KB

    • MD5

      d4ddd3e7f66971b9513fb72fa7fa1abd

    • SHA1

      5d4d0cea3347442231d216b32ee8a4c5f488cc29

    • SHA256

      1b992921c84a2bdb2aaae2b5d04ecce54ff58a3c5abc4b2686e879a72d79eb65

    • SHA512

      d1642225996a8dc62f5ba479082c9d10cbc2aeade71262fc95400bbb3637790c206b61395d00c7ce988dbb8c61d11eb078445cb2610f4071574286b2f90e004b

    • SSDEEP

      384:0TEW6VvWspa1ocy4F4lbGal7vhpNWH8B0nPro2REu4Y0wM1OTf41xCejiw:661o1ocy4GEa5JpNE8qnPrEu4Y0wM12q

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand MICROSOFT.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks