General

  • Target

    IMAGE LOGGER 3.5.rar

  • Size

    7.3MB

  • Sample

    241005-wykltaydnl

  • MD5

    5c45e1702531b05ec9e72320ef5e3b00

  • SHA1

    9f0ba87335ca7439cdcac2cf2c26477553e602ce

  • SHA256

    4e4055e346c8570e49928ddeba4c4bf509b5da93d9dc156dd1996407db1bbd6c

  • SHA512

    fdb06b7f7f9ac3364dc186e6987d56b1002e02172cac41529aa2ce4a515711ab404a130c14ca62544e7b9fe95793fd207d9efe7bb1073cc0c596c0c6747e3bee

  • SSDEEP

    196608:NavUeAVBSs/wZeCAOGCbfhyQIixaK0wFkJXuZP1McyBG/:aUeqBSs/pCoCzoBixp0wOXWdMdBG/

Malware Config

Targets

    • Target

      IMAGE LOGGER 3.5.exe

    • Size

      10.0MB

    • MD5

      af94182d4d8780dcd463480fc9c4a489

    • SHA1

      4cad9d5ca0f5da577928b11136572813d6435d6e

    • SHA256

      929d5b596c6904da3809de08a43679c3ef5ab645dced22f644fec8f004c5c57e

    • SHA512

      c16b9cd7201f0325033fbc8f4907ba6b8452090c16373bbe20066439e457b44214b6fe229820d875aa4e09f0995db33c27e0d5805ef7cd26b4d8026eab1e91ee

    • SSDEEP

      196608:d18PvLjv+bhqNVoB0SEsucQZ41JBbIM11tU:n8PjL+9qz80SJHQK1Jx1vU

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks