General

  • Target

    6c39a7ee817e685c65ea08c12a6dbccb71bc02f385f6779218342b85f225862eN

  • Size

    426KB

  • Sample

    241031-pdasjsydll

  • MD5

    4e97e93a26314af12d0bf6496e017b20

  • SHA1

    0f60f6e0d8c27e9ddfa6c3f2fda1ed270a797360

  • SHA256

    6c39a7ee817e685c65ea08c12a6dbccb71bc02f385f6779218342b85f225862e

  • SHA512

    2d57f1eafc36727ea7e0e21338444a873c268968ece685ec9a21df9edb0b2ac5f1d1282fd4b103741a96a8ed22f890dcbd38152642ba13b5238731f2a66c5575

  • SSDEEP

    6144:8Z5f30291xuMHlpw9wrvwewMdBtbIbd5xv6P/6CuCNJ0hOYR:8nk291kMHlpw6r4eL3IbxvoyClwzR

Score
10/10

Malware Config

Extracted

Family

mofongoloader

C2

https://checkcloudnet.com/check/connection

Attributes
  • user_agent

    UA/1

Targets

    • Target

      6c39a7ee817e685c65ea08c12a6dbccb71bc02f385f6779218342b85f225862eN

    • Size

      426KB

    • MD5

      4e97e93a26314af12d0bf6496e017b20

    • SHA1

      0f60f6e0d8c27e9ddfa6c3f2fda1ed270a797360

    • SHA256

      6c39a7ee817e685c65ea08c12a6dbccb71bc02f385f6779218342b85f225862e

    • SHA512

      2d57f1eafc36727ea7e0e21338444a873c268968ece685ec9a21df9edb0b2ac5f1d1282fd4b103741a96a8ed22f890dcbd38152642ba13b5238731f2a66c5575

    • SSDEEP

      6144:8Z5f30291xuMHlpw9wrvwewMdBtbIbd5xv6P/6CuCNJ0hOYR:8nk291kMHlpw6r4eL3IbxvoyClwzR

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks