General

  • Target

    BlankGrabber.exe

  • Size

    6.9MB

  • Sample

    241001-ty883ashqa

  • MD5

    25f19244dca6eb8e926e1d0eddedf346

  • SHA1

    11c3e85a8f6cd3885aa7bc2d5b67f15b392f9bdb

  • SHA256

    713b36d70e82769672cbe754fea50490699b29e923ee9cd065d5dd98d8129848

  • SHA512

    2520e28e9f1b3342ae136fe0cf3d9cd72daefc8a923a8330acf7c723946602fd081b832c36dcaf54c13ea3d58359cedd27bba407d80e161e351414ec59b23d00

  • SSDEEP

    98304:IRDDjWM8JEE1rdG+ImamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeROYKJJcGx:I50cpeNTfm/pf+xk4dWROtrbWOjgda

Malware Config

Targets

    • Target

      BlankGrabber.exe

    • Size

      6.9MB

    • MD5

      25f19244dca6eb8e926e1d0eddedf346

    • SHA1

      11c3e85a8f6cd3885aa7bc2d5b67f15b392f9bdb

    • SHA256

      713b36d70e82769672cbe754fea50490699b29e923ee9cd065d5dd98d8129848

    • SHA512

      2520e28e9f1b3342ae136fe0cf3d9cd72daefc8a923a8330acf7c723946602fd081b832c36dcaf54c13ea3d58359cedd27bba407d80e161e351414ec59b23d00

    • SSDEEP

      98304:IRDDjWM8JEE1rdG+ImamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeROYKJJcGx:I50cpeNTfm/pf+xk4dWROtrbWOjgda

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      }�����v.pyc

    • Size

      1KB

    • MD5

      4a585f5ee33b73f8f351c79d1f3c349b

    • SHA1

      aa7a76b811c94d583b7d29ae0a61b689c0d3512d

    • SHA256

      ef8295bb33327605140da94116487487b0490ae848ebaa1aa9deac914b3927dc

    • SHA512

      2222d92c8b5b8b5f60974ead0c1b48c820dd7bbe657dc7ebc59c5a9cf695d7a6f05b94381e6767fb0fba44c0426527b20ac8fb9b4f1bda8f6bdfb3e0cf634184

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks