General

  • Target

    galaxy_swapper_v2.exe

  • Size

    18.6MB

  • Sample

    240628-2xc38svama

  • MD5

    a923c5f39fb20d0b2622f9b7e7974760

  • SHA1

    0f3dca40d8ed149b2c908be4db8f98651e7b6148

  • SHA256

    c68ad8cda0b771c8e4f7cf0220c1b4fbde0aa05484a05b97446dbed3816f1a51

  • SHA512

    e9b0b63ff9bb201e6800a358f026d23279c8d5644a3bc80d00b60daf3776b66d5ec6fabfbdd5fc3d1c3a1a0c7024f575bae411f29b7d96ee969bc187e3b9c0c3

  • SSDEEP

    393216:BqPnLFXlrRtQpDOETgsEAfGFwrgmdHGvEH5wKmq:oPLFXNRtQoEEKhBSc

Malware Config

Targets

    • Target

      galaxy_swapper_v2.exe

    • Size

      18.6MB

    • MD5

      a923c5f39fb20d0b2622f9b7e7974760

    • SHA1

      0f3dca40d8ed149b2c908be4db8f98651e7b6148

    • SHA256

      c68ad8cda0b771c8e4f7cf0220c1b4fbde0aa05484a05b97446dbed3816f1a51

    • SHA512

      e9b0b63ff9bb201e6800a358f026d23279c8d5644a3bc80d00b60daf3776b66d5ec6fabfbdd5fc3d1c3a1a0c7024f575bae411f29b7d96ee969bc187e3b9c0c3

    • SSDEEP

      393216:BqPnLFXlrRtQpDOETgsEAfGFwrgmdHGvEH5wKmq:oPLFXNRtQoEEKhBSc

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks