General

  • Target

    IMAGE LOGGER 3.5.exe

  • Size

    10.0MB

  • Sample

    241003-x3ndyawcjh

  • MD5

    af94182d4d8780dcd463480fc9c4a489

  • SHA1

    4cad9d5ca0f5da577928b11136572813d6435d6e

  • SHA256

    929d5b596c6904da3809de08a43679c3ef5ab645dced22f644fec8f004c5c57e

  • SHA512

    c16b9cd7201f0325033fbc8f4907ba6b8452090c16373bbe20066439e457b44214b6fe229820d875aa4e09f0995db33c27e0d5805ef7cd26b4d8026eab1e91ee

  • SSDEEP

    196608:d18PvLjv+bhqNVoB0SEsucQZ41JBbIM11tU:n8PjL+9qz80SJHQK1Jx1vU

Malware Config

Targets

    • Target

      IMAGE LOGGER 3.5.exe

    • Size

      10.0MB

    • MD5

      af94182d4d8780dcd463480fc9c4a489

    • SHA1

      4cad9d5ca0f5da577928b11136572813d6435d6e

    • SHA256

      929d5b596c6904da3809de08a43679c3ef5ab645dced22f644fec8f004c5c57e

    • SHA512

      c16b9cd7201f0325033fbc8f4907ba6b8452090c16373bbe20066439e457b44214b6fe229820d875aa4e09f0995db33c27e0d5805ef7cd26b4d8026eab1e91ee

    • SSDEEP

      196608:d18PvLjv+bhqNVoB0SEsucQZ41JBbIM11tU:n8PjL+9qz80SJHQK1Jx1vU

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks