Resubmissions

10-10-2024 21:53

241010-1rk18ateqk 10

10-10-2024 21:51

241010-1qtlzaycjg 10

General

  • Target

    Loader.exe

  • Size

    7.5MB

  • Sample

    241010-1rk18ateqk

  • MD5

    2cbe71ef6d75e37cece5da68e05dd410

  • SHA1

    e2c60e73ac40a48b0acd5b4ee06434c6dcb84db3

  • SHA256

    352dffface76468a1035d05fe9d08e270c9075d49f27e2c13c8c44e11f6b5c49

  • SHA512

    4d65295fc7e3845526edbfb6a3e2af28796c9866dbdbbcb40e1fce3041a69aa2502cc2c0a4c4fccb9fc692c095085204792bd4a24cf8d2777936bdc16949acc5

  • SSDEEP

    196608:z6unqZHwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSM:1XIH2XgHq+jq93YoZ

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.5MB

    • MD5

      2cbe71ef6d75e37cece5da68e05dd410

    • SHA1

      e2c60e73ac40a48b0acd5b4ee06434c6dcb84db3

    • SHA256

      352dffface76468a1035d05fe9d08e270c9075d49f27e2c13c8c44e11f6b5c49

    • SHA512

      4d65295fc7e3845526edbfb6a3e2af28796c9866dbdbbcb40e1fce3041a69aa2502cc2c0a4c4fccb9fc692c095085204792bd4a24cf8d2777936bdc16949acc5

    • SSDEEP

      196608:z6unqZHwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSM:1XIH2XgHq+jq93YoZ

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks