General

  • Target

    Loader.vmp.exe

  • Size

    14.7MB

  • Sample

    240929-tvg1ea1drn

  • MD5

    4a2d360263e0d70effb3257869eb8e28

  • SHA1

    8690352b344998f444ba9f218d514a3129ef7988

  • SHA256

    cd57e487ecd13c77c9fa289607ab26ec15e5738dc1c2edef998da730ed28dee5

  • SHA512

    de02cb6e69d4c30f33ea11ff54452633f27a9c0b912916f265adb688c4bb40f52d8030594205a92888cdf363c44c32e4f7c136e32ad7914fc9589ed6de733f54

  • SSDEEP

    393216:GwcR8E9z+Yb4Ben+oDe8WnJCr72B/Fqyf0gstiAKO:G/RBDy6XXW07O4vjZ

Malware Config

Targets

    • Target

      Loader.vmp.exe

    • Size

      14.7MB

    • MD5

      4a2d360263e0d70effb3257869eb8e28

    • SHA1

      8690352b344998f444ba9f218d514a3129ef7988

    • SHA256

      cd57e487ecd13c77c9fa289607ab26ec15e5738dc1c2edef998da730ed28dee5

    • SHA512

      de02cb6e69d4c30f33ea11ff54452633f27a9c0b912916f265adb688c4bb40f52d8030594205a92888cdf363c44c32e4f7c136e32ad7914fc9589ed6de733f54

    • SSDEEP

      393216:GwcR8E9z+Yb4Ben+oDe8WnJCr72B/Fqyf0gstiAKO:G/RBDy6XXW07O4vjZ

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      J�I<-.pyc

    • Size

      857B

    • MD5

      68eb9b334001a5a328da69439fdfb4f5

    • SHA1

      30794a24e000241759b33f9f3f6855cef6adc0e3

    • SHA256

      d69409923ae2489b098cb02e842a860ad896cc07e5d9a3a2eb36d77a26415b2d

    • SHA512

      5b9601249e5715bb6f2f99c5c690d9153919c3440c11069c9dc4eb3e6a339e828ef7197e190f75e86b55db58f2e5d4c402b7c390b4b349b6d04d0846c03a1fce

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks