General

  • Target

    USI.exe

  • Size

    6.7MB

  • Sample

    240927-14dsnsscpq

  • MD5

    6f65b4826f2a5e9e33dfe63bba1d138d

  • SHA1

    480a8dc04761127b859c94ad3bb3347e577ffb0a

  • SHA256

    0f41b1b95134022ed42330c091a4a2a4f1a261f4a5544b5490dba3df713e2459

  • SHA512

    49658edce66e615bf23aa83ee40281b63660a4a46f90c3b2c9023cca88cf4833d49c9b66c4cebfa5d0568b0f16d6453ae2713c0a00e9ef479de185d830899b5c

  • SSDEEP

    98304:WAIu4+DcilBLiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDeISpXqPHzH:W7p+DpeNoInY7/sHfbRyzSEfYgDTh

Malware Config

Targets

    • Target

      USI.exe

    • Size

      6.7MB

    • MD5

      6f65b4826f2a5e9e33dfe63bba1d138d

    • SHA1

      480a8dc04761127b859c94ad3bb3347e577ffb0a

    • SHA256

      0f41b1b95134022ed42330c091a4a2a4f1a261f4a5544b5490dba3df713e2459

    • SHA512

      49658edce66e615bf23aa83ee40281b63660a4a46f90c3b2c9023cca88cf4833d49c9b66c4cebfa5d0568b0f16d6453ae2713c0a00e9ef479de185d830899b5c

    • SSDEEP

      98304:WAIu4+DcilBLiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDeISpXqPHzH:W7p+DpeNoInY7/sHfbRyzSEfYgDTh

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks