General

  • Target

    8a9fa57bc4fb0fe602b9314c8b7e3c61c47b1f6745c20f6cc065cc0a3502cb0f

  • Size

    7.5MB

  • Sample

    240930-agp93s1gjd

  • MD5

    1ede2f46d0c62ae12b95fe73b6ec3877

  • SHA1

    3fd4c01e4f19c72ee0ec451cd082a2889b0ad8db

  • SHA256

    8a9fa57bc4fb0fe602b9314c8b7e3c61c47b1f6745c20f6cc065cc0a3502cb0f

  • SHA512

    68cabae36a19b807a4911bb3cde8ca8adea646e874045572b027f3a4e3a218b2075741931bded74f0d1a832ce8d08101bbb1f02598490b05884ff9a4014c4b51

  • SSDEEP

    196608:7UgVVEr9wfI9jUC2gYBYv3vbW2+iITx1U6nb:pVVE+IH2gYBgDWJTnzb

Malware Config

Targets

    • Target

      8a9fa57bc4fb0fe602b9314c8b7e3c61c47b1f6745c20f6cc065cc0a3502cb0f

    • Size

      7.5MB

    • MD5

      1ede2f46d0c62ae12b95fe73b6ec3877

    • SHA1

      3fd4c01e4f19c72ee0ec451cd082a2889b0ad8db

    • SHA256

      8a9fa57bc4fb0fe602b9314c8b7e3c61c47b1f6745c20f6cc065cc0a3502cb0f

    • SHA512

      68cabae36a19b807a4911bb3cde8ca8adea646e874045572b027f3a4e3a218b2075741931bded74f0d1a832ce8d08101bbb1f02598490b05884ff9a4014c4b51

    • SSDEEP

      196608:7UgVVEr9wfI9jUC2gYBYv3vbW2+iITx1U6nb:pVVE+IH2gYBgDWJTnzb

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks