General

  • Target

    TZ.exe

  • Size

    7.4MB

  • Sample

    241002-wmh9lszbjq

  • MD5

    0942cffb3efa3b68394e7c1d626ed63f

  • SHA1

    6bf1bd02cdbf6bdb6ed6a8021d6b19541171eedd

  • SHA256

    6444e46a6ddec80d96604c170a0eaa9ae30605432c10895101a8fd6fdf7de373

  • SHA512

    6cac769bf2c1e2798f7fdecc740237ec219d5af4ab51921b6a3c7ed5993cb3398dceceddbf8947a975762381d29e6ab38ec49ddc179fe037e500812cd81e8c96

  • SSDEEP

    98304:JpaMc+nEurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMq:nvnEurErvI9pWjgyvoaYrE41JIuICoxp

Malware Config

Targets

    • Target

      TZ.exe

    • Size

      7.4MB

    • MD5

      0942cffb3efa3b68394e7c1d626ed63f

    • SHA1

      6bf1bd02cdbf6bdb6ed6a8021d6b19541171eedd

    • SHA256

      6444e46a6ddec80d96604c170a0eaa9ae30605432c10895101a8fd6fdf7de373

    • SHA512

      6cac769bf2c1e2798f7fdecc740237ec219d5af4ab51921b6a3c7ed5993cb3398dceceddbf8947a975762381d29e6ab38ec49ddc179fe037e500812cd81e8c96

    • SSDEEP

      98304:JpaMc+nEurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMq:nvnEurErvI9pWjgyvoaYrE41JIuICoxp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks