General

  • Target

    VxrusHisVirus.exe

  • Size

    7.5MB

  • Sample

    240929-yaxbta1eka

  • MD5

    6110ef13b9ac28d2db493cc9e9a8d877

  • SHA1

    046208f499a506d0bd29a868e3efec7a88fc3430

  • SHA256

    57c8cf68f41a31f229822852043acfd80f8d64f72b47a32caacb4a457d880356

  • SHA512

    4c94dbef75681c7491118fcad8d440a295ba35802f3606b1c37563ad4c505edf820379a8230f60a8676fa21e9c474a26e2638ac6526430b1ca1513fec5db3d48

  • SSDEEP

    196608:IzgVVEbpVwfI9jUC2gYBYv3vbW2+iITx1U6ny:LVVEsIH2gYBgDWJTnzy

Malware Config

Targets

    • Target

      VxrusHisVirus.exe

    • Size

      7.5MB

    • MD5

      6110ef13b9ac28d2db493cc9e9a8d877

    • SHA1

      046208f499a506d0bd29a868e3efec7a88fc3430

    • SHA256

      57c8cf68f41a31f229822852043acfd80f8d64f72b47a32caacb4a457d880356

    • SHA512

      4c94dbef75681c7491118fcad8d440a295ba35802f3606b1c37563ad4c505edf820379a8230f60a8676fa21e9c474a26e2638ac6526430b1ca1513fec5db3d48

    • SSDEEP

      196608:IzgVVEbpVwfI9jUC2gYBYv3vbW2+iITx1U6ny:LVVEsIH2gYBgDWJTnzy

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      2qty�!.pyc

    • Size

      1KB

    • MD5

      05b28a3a1c77405e75d1b418a0f9e088

    • SHA1

      e89c85427b0c4606186a7c70d68de896dd3fb92c

    • SHA256

      3449894dd0e05f5b6b6572ca9e11fe665082a28988f5872b61e330498b9da836

    • SHA512

      02e6a7be28d01e9b2a26d5812087e0c46b6d06332856ccfacf4a50178f419c506d47b18c4103d478f45bdbc021c84dc246c277dd3040d352f032ecd13357dce0

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks