General

  • Target

    f589fcc7eadd141cd236de03b7fd786668017655a0adeb057cd343f95117a6f1

  • Size

    38.8MB

  • Sample

    240624-gwk28sygpc

  • MD5

    de78f05822b58389a08df867280df451

  • SHA1

    d27954678d26afb60dd51750f69520a79bf8b997

  • SHA256

    f589fcc7eadd141cd236de03b7fd786668017655a0adeb057cd343f95117a6f1

  • SHA512

    8374e56d7d3e8ced16e15cd8c34e7059feacb94964b4a50c22cbf6d3045f2c52119d0393f218d0d4b445afa6ce12f607c85b09b82859275d81ebc91880ebe5d2

  • SSDEEP

    786432:DCyIg99ycT/7t7OB2K4oX5Znw0e7s0sjgTTb2:DCxg99yaTt7G2K4opd3e7s0sjy

Malware Config

Targets

    • Target

      f589fcc7eadd141cd236de03b7fd786668017655a0adeb057cd343f95117a6f1

    • Size

      38.8MB

    • MD5

      de78f05822b58389a08df867280df451

    • SHA1

      d27954678d26afb60dd51750f69520a79bf8b997

    • SHA256

      f589fcc7eadd141cd236de03b7fd786668017655a0adeb057cd343f95117a6f1

    • SHA512

      8374e56d7d3e8ced16e15cd8c34e7059feacb94964b4a50c22cbf6d3045f2c52119d0393f218d0d4b445afa6ce12f607c85b09b82859275d81ebc91880ebe5d2

    • SSDEEP

      786432:DCyIg99ycT/7t7OB2K4oX5Znw0e7s0sjgTTb2:DCxg99yaTt7G2K4opd3e7s0sjy

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Executes dropped EXE

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks