General

  • Target

    8d7a7ffff42993ee6e911091320ae9c6a72fd64566da4cd616b74862533a93ae.exe

  • Size

    58KB

  • Sample

    241122-mzy16ayrat

  • MD5

    aa82ff487467ef88c65f0f3b95556c6f

  • SHA1

    125c0b88815739170579f546aabf2553af774c69

  • SHA256

    8d7a7ffff42993ee6e911091320ae9c6a72fd64566da4cd616b74862533a93ae

  • SHA512

    69ce34ed88604aeaa0dac338b8f9c7779df7d09d66efc1a8dcf810269e857af1cb6b77828311c4f761e3fe377febcbe2822af7d3f8b5de7693f6a2d45c64083a

  • SSDEEP

    1536:gQTIubHy5wQkJAejpzkGdxDLw3qMnd2wrtb:R4wPZpzNdxDL252ktb

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      8d7a7ffff42993ee6e911091320ae9c6a72fd64566da4cd616b74862533a93ae.exe

    • Size

      58KB

    • MD5

      aa82ff487467ef88c65f0f3b95556c6f

    • SHA1

      125c0b88815739170579f546aabf2553af774c69

    • SHA256

      8d7a7ffff42993ee6e911091320ae9c6a72fd64566da4cd616b74862533a93ae

    • SHA512

      69ce34ed88604aeaa0dac338b8f9c7779df7d09d66efc1a8dcf810269e857af1cb6b77828311c4f761e3fe377febcbe2822af7d3f8b5de7693f6a2d45c64083a

    • SSDEEP

      1536:gQTIubHy5wQkJAejpzkGdxDLw3qMnd2wrtb:R4wPZpzNdxDL252ktb

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks