General

  • Target

    1c5425dc2511aea1fc2a8aef8365b87fa732690aae202a982f45f8849bdd4e3b

  • Size

    35KB

  • Sample

    241109-yzhvqazras

  • MD5

    3f7bd28143af953c07f4e34ba509e035

  • SHA1

    3f16df9139b5f8b83d0d55c3970b0d0e5252cd73

  • SHA256

    1c5425dc2511aea1fc2a8aef8365b87fa732690aae202a982f45f8849bdd4e3b

  • SHA512

    6ead86bdb9c897ff90d44b7effb5df38b920f338bce236563362268cc9645fd98aa97023abea8f4bc09b5cde0af24518f0a3da7277e8542cce3eaf903bf2ddb4

  • SSDEEP

    768:cflivXrVKpVhKvtxwYHwVFoeAQ2mucwUU:ylqrVKprVuQ2l

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      1c5425dc2511aea1fc2a8aef8365b87fa732690aae202a982f45f8849bdd4e3b

    • Size

      35KB

    • MD5

      3f7bd28143af953c07f4e34ba509e035

    • SHA1

      3f16df9139b5f8b83d0d55c3970b0d0e5252cd73

    • SHA256

      1c5425dc2511aea1fc2a8aef8365b87fa732690aae202a982f45f8849bdd4e3b

    • SHA512

      6ead86bdb9c897ff90d44b7effb5df38b920f338bce236563362268cc9645fd98aa97023abea8f4bc09b5cde0af24518f0a3da7277e8542cce3eaf903bf2ddb4

    • SSDEEP

      768:cflivXrVKpVhKvtxwYHwVFoeAQ2mucwUU:ylqrVKprVuQ2l

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks