General

  • Target

    2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f.exe

  • Size

    5.9MB

  • Sample

    241005-bhvfvs1cjh

  • MD5

    e95c0515d1d3bf9c2a6e0b20ba1ebd98

  • SHA1

    8ca53ae3b33df086bd12d7fb31ada294f699bf9d

  • SHA256

    2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f

  • SHA512

    06b0513e21321ec3bf28b9ca8a5ab422e458fdf9a997c05cb3b3eeed0ca75d8f0586c0836cdf0c2d30f73937bda20a580e5903cc35238c4bc50cbffbb41ac705

  • SSDEEP

    98304:i97mDSuXXOgRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nQek:ihmDZ5RHvUWvozWOxu9kXwvdbDlA03NE

Malware Config

Targets

    • Target

      2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f.exe

    • Size

      5.9MB

    • MD5

      e95c0515d1d3bf9c2a6e0b20ba1ebd98

    • SHA1

      8ca53ae3b33df086bd12d7fb31ada294f699bf9d

    • SHA256

      2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f

    • SHA512

      06b0513e21321ec3bf28b9ca8a5ab422e458fdf9a997c05cb3b3eeed0ca75d8f0586c0836cdf0c2d30f73937bda20a580e5903cc35238c4bc50cbffbb41ac705

    • SSDEEP

      98304:i97mDSuXXOgRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nQek:ihmDZ5RHvUWvozWOxu9kXwvdbDlA03NE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks