General

  • Target

    Loader.exe

  • Size

    7.5MB

  • Sample

    241005-ctjn6sthme

  • MD5

    8f2b009d265cf435f3eacff4f217e2e4

  • SHA1

    c5f228932332f5823c92977b22308b4429ed95ac

  • SHA256

    824b514ab771e1faf23f3c33c3450d607e0750bbf8f1cc1143cbb775e991bec3

  • SHA512

    074e8dc888e3d514a63c6cb15816c8c34953c24ea33d589a73e48499fbd18904f3b43a8ed33b6d52d6935e202414c5cc041fd817244ae5e9e5c0e1d37a9703e4

  • SSDEEP

    196608:GMgVVEawfI9jUC2gYBYv3vbW2+iITx1U6nq:8VVEJIH2gYBgDWJTnzq

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.5MB

    • MD5

      8f2b009d265cf435f3eacff4f217e2e4

    • SHA1

      c5f228932332f5823c92977b22308b4429ed95ac

    • SHA256

      824b514ab771e1faf23f3c33c3450d607e0750bbf8f1cc1143cbb775e991bec3

    • SHA512

      074e8dc888e3d514a63c6cb15816c8c34953c24ea33d589a73e48499fbd18904f3b43a8ed33b6d52d6935e202414c5cc041fd817244ae5e9e5c0e1d37a9703e4

    • SSDEEP

      196608:GMgVVEawfI9jUC2gYBYv3vbW2+iITx1U6nq:8VVEJIH2gYBgDWJTnzq

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks