General

  • Target

    grabber.rar

  • Size

    8.1MB

  • Sample

    240929-tbpadazgmn

  • MD5

    8c7071b3ff16ec5df602289aded0bc7f

  • SHA1

    b9a015a54d8beaf1d2af8b71a647372048b5c334

  • SHA256

    c2c33a53eda1b170ff38a2cb03cfc11bf5d9cfed21702dba8d71b18fe0bf5387

  • SHA512

    b99b372bfe1ae976c7dc87f7e257fe50dd2c506de8c09bdeb0c5c072e42b540bd5c688b6e5abf539b53d80e7c5a1c22a65e3f3f11e91612e29083ec18e1670ef

  • SSDEEP

    196608:IA8INT6FEINYcsybzEBiv89gwRYL93YG7/N0oDJL7FkJ:sXEINYcsyb4yMgFYWqyJi

Malware Config

Targets

    • Target

      builder/builder.exe

    • Size

      8.2MB

    • MD5

      d6ff056792c4ad8b7ba9a14e4d7eaea2

    • SHA1

      a93e806ded47f0c7b679dd679d1acb7825731efb

    • SHA256

      ad9cfa3f185881933a15502cefd27c26ab1364504c0b46cb6211bc56e64a8527

    • SHA512

      28e03a20559446da0c7c4d633ded26d2141dfa0e8788bbc00e9ae55632c1876579f32564b67bfbb44bcbbef0b22c610f8faf98e6a2e5e9a4627ba8d78a537c45

    • SSDEEP

      196608:fQWBsdurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:pmurEUWjZZ4dDLIeW7zWGPTNCp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks