General

  • Target

    purchase_order_june2020.jar

  • Size

    12KB

  • Sample

    200630-6tccqwyr4a

  • MD5

    072a7dde70bb530505d079fa0e58f5b3

  • SHA1

    17ecf45e01685a6eb6f664984774f0e393136962

  • SHA256

    d19e6201d033366ca89123177f5e53904f06f043dca06d162578920e064e34f2

  • SHA512

    bbce409bcb919193c0a00699f154246b7d1f46ab0bd6014b06ab0bbb29a2a45563897ee41d53f20efd7e1360ccce3f637bb77814d18b492477d201d3101e90dd

Score
8/10

Malware Config

Targets

    • Target

      purchase_order_june2020.jar

    • Size

      12KB

    • MD5

      072a7dde70bb530505d079fa0e58f5b3

    • SHA1

      17ecf45e01685a6eb6f664984774f0e393136962

    • SHA256

      d19e6201d033366ca89123177f5e53904f06f043dca06d162578920e064e34f2

    • SHA512

      bbce409bcb919193c0a00699f154246b7d1f46ab0bd6014b06ab0bbb29a2a45563897ee41d53f20efd7e1360ccce3f637bb77814d18b492477d201d3101e90dd

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run entry to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks