General

  • Target

    Gen Setup.exe

  • Size

    7.4MB

  • Sample

    241005-2y8ljavhjj

  • MD5

    d1485c468be8a91baf7dc60d7525cf32

  • SHA1

    70f3179a1b41b2baf69c3c4b635eef01da48410d

  • SHA256

    2f1f2dbc47caf96cdba43cd95aa046f6010a7d8cd76e677020d300ff2cc80a7f

  • SHA512

    84c7e4ad42090be655e5ad1844d935be4bc3f70f1b6c2afa04d701cb80089c2b5e24cdad3dd651b44000ef835512c918a23b4dab6386266b780ca2774ddb7eb8

  • SSDEEP

    196608:SH0cDebFLjv+bhqNVoBKUh8mz4Iv9Pfu1D76:1ieb9L+9qz8/b4INuR6

Malware Config

Targets

    • Target

      Gen Setup.exe

    • Size

      7.4MB

    • MD5

      d1485c468be8a91baf7dc60d7525cf32

    • SHA1

      70f3179a1b41b2baf69c3c4b635eef01da48410d

    • SHA256

      2f1f2dbc47caf96cdba43cd95aa046f6010a7d8cd76e677020d300ff2cc80a7f

    • SHA512

      84c7e4ad42090be655e5ad1844d935be4bc3f70f1b6c2afa04d701cb80089c2b5e24cdad3dd651b44000ef835512c918a23b4dab6386266b780ca2774ddb7eb8

    • SSDEEP

      196608:SH0cDebFLjv+bhqNVoBKUh8mz4Iv9Pfu1D76:1ieb9L+9qz8/b4INuR6

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks