General

  • Target

    GalSwapperV1.3.EXE

  • Size

    54.8MB

  • Sample

    240508-mh9rbsfh9y

  • MD5

    1cc49dc1016179affa0db967ab9a66ff

  • SHA1

    61048c1d34262fdd8e9178ac3797235bcfe16d45

  • SHA256

    ed417a65ec07d0e7e0b487730a095b1933a8498c5c05b1f44c4442619cb3f508

  • SHA512

    f758532e1308888dc822885d9c5dd890932786a4d873debceeae2c2e705b0d607c546691475653f77dd3532d07a8bfc55edf0757e00451d3685fd522b4a769ee

  • SSDEEP

    1572864:x/cBu+I3Hq4Ww2Jf70sfPFoaY04qJG+RhZAUsiYDvk:xf0JfVS+Rfu

Malware Config

Targets

    • Target

      GalSwapperV1.3.EXE

    • Size

      54.8MB

    • MD5

      1cc49dc1016179affa0db967ab9a66ff

    • SHA1

      61048c1d34262fdd8e9178ac3797235bcfe16d45

    • SHA256

      ed417a65ec07d0e7e0b487730a095b1933a8498c5c05b1f44c4442619cb3f508

    • SHA512

      f758532e1308888dc822885d9c5dd890932786a4d873debceeae2c2e705b0d607c546691475653f77dd3532d07a8bfc55edf0757e00451d3685fd522b4a769ee

    • SSDEEP

      1572864:x/cBu+I3Hq4Ww2Jf70sfPFoaY04qJG+RhZAUsiYDvk:xf0JfVS+Rfu

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks