General

  • Target

    Injector.exe

  • Size

    461KB

  • Sample

    240604-n45j6sfg98

  • MD5

    74e9c2da84432615f4562f724c8b792a

  • SHA1

    f10ba74f0a8bdb74335a94ee377979a6b6204c84

  • SHA256

    95b45baa28467be3ca303f48f696990d3491aa9d24ee888d221d5170f7bf5a23

  • SHA512

    12990370f2ae48b2a3e6ad624704b3feffb7c71e44f08037e84f8ce1e75b0faf8a46facd90c4aa5ee576c063dbbbe1e39e8ad36fcd783741dc2f84fa52c39d33

  • SSDEEP

    12288:wu/osQMgL96w0SVvV6fcaubLH31O2lxvdJGtKcctrJnSvLhTt:wur9gkEPGcHHX1OSr/cYtns

Malware Config

Targets

    • Target

      Injector.exe

    • Size

      461KB

    • MD5

      74e9c2da84432615f4562f724c8b792a

    • SHA1

      f10ba74f0a8bdb74335a94ee377979a6b6204c84

    • SHA256

      95b45baa28467be3ca303f48f696990d3491aa9d24ee888d221d5170f7bf5a23

    • SHA512

      12990370f2ae48b2a3e6ad624704b3feffb7c71e44f08037e84f8ce1e75b0faf8a46facd90c4aa5ee576c063dbbbe1e39e8ad36fcd783741dc2f84fa52c39d33

    • SSDEEP

      12288:wu/osQMgL96w0SVvV6fcaubLH31O2lxvdJGtKcctrJnSvLhTt:wur9gkEPGcHHX1OSr/cYtns

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks