General

  • Target

    akame (1).exe

  • Size

    8.1MB

  • Sample

    240925-r1nc9stgqd

  • MD5

    e91b9515d27171ceddae5d1568469692

  • SHA1

    397e41ce8829129686f0398c32903cc624ce9d4d

  • SHA256

    336116651d657263fbeca5e3f2fe2116a93e1b83bf37cd5b230bfa999195a929

  • SHA512

    ba8d5cb2daa2ab170d815d8a207dd19102b4da2d94a36cf6b5f1e2a35e5fe2a4dc9e4e632d73eb56d10bbeced52e7044f8700400b0e8695fbfe5db7ad1bece0d

  • SSDEEP

    196608:wEY36YuKOshoKMuIkhVastRL5Di3unSEi1D7K:ZY3vOshouIkPftRL54XNRK

Malware Config

Targets

    • Target

      akame (1).exe

    • Size

      8.1MB

    • MD5

      e91b9515d27171ceddae5d1568469692

    • SHA1

      397e41ce8829129686f0398c32903cc624ce9d4d

    • SHA256

      336116651d657263fbeca5e3f2fe2116a93e1b83bf37cd5b230bfa999195a929

    • SHA512

      ba8d5cb2daa2ab170d815d8a207dd19102b4da2d94a36cf6b5f1e2a35e5fe2a4dc9e4e632d73eb56d10bbeced52e7044f8700400b0e8695fbfe5db7ad1bece0d

    • SSDEEP

      196608:wEY36YuKOshoKMuIkhVastRL5Di3unSEi1D7K:ZY3vOshouIkPftRL54XNRK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks