General

  • Target

    0xcheat.exe

  • Size

    8.2MB

  • Sample

    240521-t7nnqacb21

  • MD5

    e105137e99534bb200e1db67c430e57e

  • SHA1

    b95539aafdd4e2bd1e8ef783ad65cb5a627c92c6

  • SHA256

    e98e2d71d36b70545619496744b226aadb6f99f3721541d709018ee9fdb24011

  • SHA512

    fac4662c466ee96985d0698f2116d1f39971aaa0010747e91e991aeff3900e78d1916cbb2dae92577f8c71fe82941041c3bc837395055f3496ea67d01e4acd8e

  • SSDEEP

    196608:E3gI+o2n018urErvI9pWjgaAnajMs4F23fQC//OoLxhF:9I72n0yurEUWjJjiFoo4jLxhF

Malware Config

Targets

    • Target

      0xcheat.exe

    • Size

      8.2MB

    • MD5

      e105137e99534bb200e1db67c430e57e

    • SHA1

      b95539aafdd4e2bd1e8ef783ad65cb5a627c92c6

    • SHA256

      e98e2d71d36b70545619496744b226aadb6f99f3721541d709018ee9fdb24011

    • SHA512

      fac4662c466ee96985d0698f2116d1f39971aaa0010747e91e991aeff3900e78d1916cbb2dae92577f8c71fe82941041c3bc837395055f3496ea67d01e4acd8e

    • SSDEEP

      196608:E3gI+o2n018urErvI9pWjgaAnajMs4F23fQC//OoLxhF:9I72n0yurEUWjJjiFoo4jLxhF

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �xS!��.pyc

    • Size

      1KB

    • MD5

      5e62d3a1c95862114b72ddb7c008e24d

    • SHA1

      b8b7bd89ec3b5bba85332d5c0085db8d3efef61e

    • SHA256

      8997dcb47d7526ef54c1626d0865d3f2780eccaf196b5de15169d15e371e38e4

    • SHA512

      c3219e8f4354256e4a7fc8201c208fe6a4f230b8f05a529e6a32273ea4fe409fe9e43082dfd08685bcecd40122f1befac81e06fc7b802199c6aade059ee4928d

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks