General

  • Target

    d517b2b6470277c859b9fe1d91008c5072f3c019c2ef8d0a45a0c6112aac6ace.exe

  • Size

    8.2MB

  • Sample

    240928-ca3yps1bmq

  • MD5

    66c1d33fa2373f9f734336b87f123e31

  • SHA1

    e5b1fd794dca60419b59bc9318f9043d3450dbcf

  • SHA256

    d517b2b6470277c859b9fe1d91008c5072f3c019c2ef8d0a45a0c6112aac6ace

  • SHA512

    4c7df849830110de4555a779067dfb2816ac6336ab5325978e78eb82021db94b1b74ba1eb6e87208597ab5aaafcd95fcf5dba8bff3adef343afad289dbe21520

  • SSDEEP

    196608:KEWBOnurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:a0urEUWjZZ4dDLIeW7zWGPTNCp

Malware Config

Targets

    • Target

      d517b2b6470277c859b9fe1d91008c5072f3c019c2ef8d0a45a0c6112aac6ace.exe

    • Size

      8.2MB

    • MD5

      66c1d33fa2373f9f734336b87f123e31

    • SHA1

      e5b1fd794dca60419b59bc9318f9043d3450dbcf

    • SHA256

      d517b2b6470277c859b9fe1d91008c5072f3c019c2ef8d0a45a0c6112aac6ace

    • SHA512

      4c7df849830110de4555a779067dfb2816ac6336ab5325978e78eb82021db94b1b74ba1eb6e87208597ab5aaafcd95fcf5dba8bff3adef343afad289dbe21520

    • SSDEEP

      196608:KEWBOnurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:a0urEUWjZZ4dDLIeW7zWGPTNCp

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks