General

  • Target

    nardoware.rar

  • Size

    7.4MB

  • Sample

    240927-vdpjlavbph

  • MD5

    eebdd3522dba4b54b51f880679017660

  • SHA1

    ec5f9c4dde912448181ba9976e30205b55b3b559

  • SHA256

    96364f5c8a16f46ce8dea153ed2e015d1985dbd706690c64cba24bf69aa4ee64

  • SHA512

    ef1c69e158a6adf045c390dadc3e1535f9566e1f37ae37d6a03989069bcf226a23042eb94b9079e6df7e1fba750b2c33e49d341db25818f34554ecc02dc6e2c6

  • SSDEEP

    196608:L7zHdB0CpnZ38grYytMTiIAZUF7nTnXKloFK:DQMnZMsYKMew36mK

Malware Config

Targets

    • Target

      nardoware/Main/software.exe

    • Size

      7.5MB

    • MD5

      bee5ee8fa4024751c2f10410b38a2099

    • SHA1

      87f4594273dcd8fae82df4b5c3a6f931dcd33bc2

    • SHA256

      3a8f848441b699574acc5c968290f6ab925901edadeb28542d6d4b893f0d8a1e

    • SHA512

      c789ddf4b83d5be250cce251a7b31a120573a192df50bf95dcc0ee17fc6c6129ac3fb28d25f6ea9788c0367c264967f5f34a130c7c1b0508e470d0058ea9fd41

    • SSDEEP

      196608:/VgVVEmwfI9jUC2gYBYv3vbW2+iITx1U6n3:OVVENIH2gYBgDWJTnz3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks