General

  • Target

    Loader.exe

  • Size

    7.5MB

  • Sample

    241008-1cv8msseqf

  • MD5

    a2e2fee9416621f7836fe974e9107232

  • SHA1

    3bb30b7a1a15792a1de5ce20668df7e4d0f2aea0

  • SHA256

    9953603e5389576a759aae68d38a8b766cb6c1199116712f79de7400367b98d3

  • SHA512

    507486497d44db41d36f2e087fa073f49590203543371f97cfc24a5d29d53d6909651fc634fc56578b729dade445dc93270ee5e7c3ef127176e279deade54942

  • SSDEEP

    196608:T3unqZGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSb:aKIH2XgHq+jq93YoO

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.5MB

    • MD5

      a2e2fee9416621f7836fe974e9107232

    • SHA1

      3bb30b7a1a15792a1de5ce20668df7e4d0f2aea0

    • SHA256

      9953603e5389576a759aae68d38a8b766cb6c1199116712f79de7400367b98d3

    • SHA512

      507486497d44db41d36f2e087fa073f49590203543371f97cfc24a5d29d53d6909651fc634fc56578b729dade445dc93270ee5e7c3ef127176e279deade54942

    • SSDEEP

      196608:T3unqZGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSb:aKIH2XgHq+jq93YoO

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks