General

  • Target

    5.mac_changer (2).exe

  • Size

    8.2MB

  • Sample

    240727-fex5ssybkk

  • MD5

    191b8f8e9b3910b723fcc605190a179d

  • SHA1

    6ac7bc32890a164d533acbdc81adc18a9c3d73eb

  • SHA256

    3c83c0b36d40cc3795715cc5be786b9564f076e89be159da6fdf12d895acb058

  • SHA512

    8bf85c90ef0a5da4c4c5e04501795a41f5386a82cdfd6500ec3201d3865ee599e5fc1e78b58f83b63497a5c90f1d5089db5605556c7572ac4a1fbaa697b1ec85

  • SSDEEP

    196608:DIA9V+GurErvI9pWjgfPvzm6gs/SEjE14A3:04jurEUWjC3zDAa04A3

Malware Config

Targets

    • Target

      5.mac_changer (2).exe

    • Size

      8.2MB

    • MD5

      191b8f8e9b3910b723fcc605190a179d

    • SHA1

      6ac7bc32890a164d533acbdc81adc18a9c3d73eb

    • SHA256

      3c83c0b36d40cc3795715cc5be786b9564f076e89be159da6fdf12d895acb058

    • SHA512

      8bf85c90ef0a5da4c4c5e04501795a41f5386a82cdfd6500ec3201d3865ee599e5fc1e78b58f83b63497a5c90f1d5089db5605556c7572ac4a1fbaa697b1ec85

    • SSDEEP

      196608:DIA9V+GurErvI9pWjgfPvzm6gs/SEjE14A3:04jurEUWjC3zDAa04A3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Matrix

Tasks