General

  • Target

    grzegorzrat.exe

  • Size

    6.6MB

  • Sample

    241006-k512la1cmc

  • MD5

    fcfd2b39a40230801b219516842e1c27

  • SHA1

    87e59e6df45a844efd2462acc24afcde3111e294

  • SHA256

    2cba71e81382f66fdf71dca320a7fd413c4007a42a894df8c9b91f2f68d53853

  • SHA512

    ff5e8b26493f61de2b79dc4c5b84886d513742574f85799fc8b74f6d79681ab8930a629c17471d2c2edcd3e5a485f0d8438f6489c61b2fd8ee154fb97e0c54de

  • SSDEEP

    196608:F5FPweN/FJMIDJf0gsAGKXa1R9uAKpM4H:V/Fqyf0gsvEAKl

Malware Config

Targets

    • Target

      grzegorzrat.exe

    • Size

      6.6MB

    • MD5

      fcfd2b39a40230801b219516842e1c27

    • SHA1

      87e59e6df45a844efd2462acc24afcde3111e294

    • SHA256

      2cba71e81382f66fdf71dca320a7fd413c4007a42a894df8c9b91f2f68d53853

    • SHA512

      ff5e8b26493f61de2b79dc4c5b84886d513742574f85799fc8b74f6d79681ab8930a629c17471d2c2edcd3e5a485f0d8438f6489c61b2fd8ee154fb97e0c54de

    • SSDEEP

      196608:F5FPweN/FJMIDJf0gsAGKXa1R9uAKpM4H:V/Fqyf0gsvEAKl

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks