General

  • Target

    avixspoofer.exe

  • Size

    7.5MB

  • Sample

    241006-cr9skszejm

  • MD5

    07426f58c34ccec8fd28f9a401699f08

  • SHA1

    b85a8f5961ea5b31917c118a7499b9304c08394e

  • SHA256

    d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f

  • SHA512

    4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3

  • SSDEEP

    196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK

Malware Config

Targets

    • Target

      avixspoofer.exe

    • Size

      7.5MB

    • MD5

      07426f58c34ccec8fd28f9a401699f08

    • SHA1

      b85a8f5961ea5b31917c118a7499b9304c08394e

    • SHA256

      d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f

    • SHA512

      4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3

    • SSDEEP

      196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks