General

  • Target

    4561fb247f3a8f51753cf8f67c4e7ac9af6ad5ccf345d21e7cf26beedbeebdfdN

  • Size

    7.5MB

  • Sample

    241006-ybjr4swdqe

  • MD5

    8124a95095de1a2ca681a6a70b849300

  • SHA1

    4f4e557d0059b7247705cdc795fe89c5a59a378d

  • SHA256

    4561fb247f3a8f51753cf8f67c4e7ac9af6ad5ccf345d21e7cf26beedbeebdfd

  • SHA512

    193062a89a8e98c5a5022f5c55beb8d46d2e4956d6c0631bc472ea8bb4f2219332343b90f7643111c35d94227b01d3aaa792e60f2574c3ed3e267692c57479ee

  • SSDEEP

    196608:SLgs3ytywfI9jUC2gYBYv3vbWkGPrKYe3zJwR1:5sARIH2gYBgDWA3901

Malware Config

Targets

    • Target

      4561fb247f3a8f51753cf8f67c4e7ac9af6ad5ccf345d21e7cf26beedbeebdfdN

    • Size

      7.5MB

    • MD5

      8124a95095de1a2ca681a6a70b849300

    • SHA1

      4f4e557d0059b7247705cdc795fe89c5a59a378d

    • SHA256

      4561fb247f3a8f51753cf8f67c4e7ac9af6ad5ccf345d21e7cf26beedbeebdfd

    • SHA512

      193062a89a8e98c5a5022f5c55beb8d46d2e4956d6c0631bc472ea8bb4f2219332343b90f7643111c35d94227b01d3aaa792e60f2574c3ed3e267692c57479ee

    • SSDEEP

      196608:SLgs3ytywfI9jUC2gYBYv3vbWkGPrKYe3zJwR1:5sARIH2gYBgDWA3901

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks