General

  • Target

    57597326a7df1d16bd6998b248e40707.bin

  • Size

    449KB

  • Sample

    241103-bqafna1crq

  • MD5

    4c363aad743a8f5568bbbc7d7aacc778

  • SHA1

    3689a597bd63f4a323204268c912e7385903ec3e

  • SHA256

    e318a503621bbc091daa1c8d0863832f6e81751f4587e3ff74105d4450aa82ee

  • SHA512

    ab3469550b989f38f4778a766db438d2757b309293ae7f03387baccb0725dccd5533177ea361480c049d1ce0d3fadb746d02f813c38d46924d9e5b0624f479bd

  • SSDEEP

    12288:ocHEeg8UEHfzybCQ49xb6CNH5b4yWrSpRX1wSl:ockeg8FHfLX3JNdWrSl

Score
6/10

Malware Config

Targets

    • Target

      9a9e117db9ae2f94a250c13d9a6d03384e4011aaaca9cb28b92a136dee0dc53e.exe

    • Size

      3.3MB

    • MD5

      57597326a7df1d16bd6998b248e40707

    • SHA1

      4c27df3928758ce9c618ab3d04ed5f77033ac060

    • SHA256

      9a9e117db9ae2f94a250c13d9a6d03384e4011aaaca9cb28b92a136dee0dc53e

    • SHA512

      9cf1073e92254e01860a0472f73aea6c016368b8b0a57fb6a17e8affc8f1de318ea9a5f9e128eebb6b32997d525b29d2a4d4264eb756336597c57f9f98997533

    • SSDEEP

      12288:Zpss19tpgw6BCA+Y68X3GNyOidq7Letr3zr+8uCS:bs8Axx3HpEL2r3zr+aS

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks