General

  • Target

    avix spoofer.exe

  • Size

    7.5MB

  • Sample

    241006-cpsraazdnm

  • MD5

    07426f58c34ccec8fd28f9a401699f08

  • SHA1

    b85a8f5961ea5b31917c118a7499b9304c08394e

  • SHA256

    d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f

  • SHA512

    4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3

  • SSDEEP

    196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK

Malware Config

Targets

    • Target

      avix spoofer.exe

    • Size

      7.5MB

    • MD5

      07426f58c34ccec8fd28f9a401699f08

    • SHA1

      b85a8f5961ea5b31917c118a7499b9304c08394e

    • SHA256

      d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f

    • SHA512

      4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3

    • SSDEEP

      196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ����H�E.pyc

    • Size

      1KB

    • MD5

      9e0cf364f3f76ac1fb89782c4f374441

    • SHA1

      6bb01909c3ff490cd4d400ba17053bd53825c32e

    • SHA256

      5dcba2201720fa88372aa9315badc48359883c25a3ab961e649629fb52af3966

    • SHA512

      b20625311ac3b04b52260e4a737e4c2e2a42b972e6201f1abbbdd38410009516323c42656d5a388a11a044686183da39f6498d5ba5353b3d6820ca75a882bd80

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks