General

  • Target

    Built.exe

  • Size

    7.5MB

  • Sample

    241004-zm43vsvhmp

  • MD5

    e82245f2f30a5235ca3ff65f4bf6d5a3

  • SHA1

    db4c5dd9b2f8c79554ee7f9ece694ab3f30b86b6

  • SHA256

    710394f8e6b03dbfb78ef6a967a5f332e099459319bdca62cd61cd5695b46691

  • SHA512

    dc40e9401c42a88f28034c8e7a014588d2f1f197e77a2a01bc03fffc5077d78f6463f18c911b1242188ea26ae5902936db174ceb9d6fdcfcbf073b56120e3c2c

  • SSDEEP

    98304:3YSi8x9XQs3IurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC11p:3fP9VYurErvI9pWjgfPvzm6gsFEg4AL

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.5MB

    • MD5

      e82245f2f30a5235ca3ff65f4bf6d5a3

    • SHA1

      db4c5dd9b2f8c79554ee7f9ece694ab3f30b86b6

    • SHA256

      710394f8e6b03dbfb78ef6a967a5f332e099459319bdca62cd61cd5695b46691

    • SHA512

      dc40e9401c42a88f28034c8e7a014588d2f1f197e77a2a01bc03fffc5077d78f6463f18c911b1242188ea26ae5902936db174ceb9d6fdcfcbf073b56120e3c2c

    • SSDEEP

      98304:3YSi8x9XQs3IurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC11p:3fP9VYurErvI9pWjgfPvzm6gsFEg4AL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks