General

  • Target

    Loader.exe

  • Size

    18.0MB

  • Sample

    241010-19xsqszcpc

  • MD5

    7882abe8fc824c3a4f7b020d38b6b662

  • SHA1

    12356b0d798ef97fa97f226490ed959c8d11bb02

  • SHA256

    a5ab4944eda66f0a80cd5b1f4d35fc789c7afc38acf2e6449bf3104cf30dd2e1

  • SHA512

    6e9a31edc153840b3fd11a6a7c3e170834f6ec30fdbae7ca269a0e2f07b77e7023fa7bc718cb5cefc7fd18899d8d1b324f9d540347aedb2dcff67223e016908f

  • SSDEEP

    98304:apnEtdFBGJBamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOuAK5HSy5yB:kWFEJ8eN/FJMIDJf0gsAGK4RIuAK5X4B

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      18.0MB

    • MD5

      7882abe8fc824c3a4f7b020d38b6b662

    • SHA1

      12356b0d798ef97fa97f226490ed959c8d11bb02

    • SHA256

      a5ab4944eda66f0a80cd5b1f4d35fc789c7afc38acf2e6449bf3104cf30dd2e1

    • SHA512

      6e9a31edc153840b3fd11a6a7c3e170834f6ec30fdbae7ca269a0e2f07b77e7023fa7bc718cb5cefc7fd18899d8d1b324f9d540347aedb2dcff67223e016908f

    • SSDEEP

      98304:apnEtdFBGJBamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RNOuAK5HSy5yB:kWFEJ8eN/FJMIDJf0gsAGK4RIuAK5X4B

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks