General

  • Target

    main.rar

  • Size

    7.4MB

  • Sample

    241010-2makcswbkp

  • MD5

    08b6ccf2d788b4c28e67ba2695305299

  • SHA1

    8996495ccccf11ceb1d806f3fbfd217fdc4bf66d

  • SHA256

    1617e37bcd27307fa0992c8865eb91d8ef4d7a642132abe74ea5b46af7f648bd

  • SHA512

    b5fa0abae595859551213fff4c8babb8b87dbe6f9045a7a9b98305cb3e94ddf23ba055e41f94db801aef62043ae41e9e8774bbb6e162b864bf13094eb4e6576f

  • SSDEEP

    196608:ZHdfBJvZq5S9Mx1avNODvVzfcQSWsiBk3q9K5a1psjHjq0z:ZbJxq5xwdQSWtHKYqbjz

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.5MB

    • MD5

      598f72402d65a23e0d3cf3b62dc7f8d8

    • SHA1

      4171fce35a5add0b3036ff9fb9ef3ef5961d7b81

    • SHA256

      1904a9b7fcab0323088596c84e47f11d4f9c1852ba32790be46886efe9f43cc8

    • SHA512

      8cb8a8bd72884d89e0907b090bb39f9f784509c7f6ee2c5912985fe0c253d0db031e40abeb65d0a277fde7b508795dfb81782f43434eb4234250f9d677e28c80

    • SSDEEP

      196608:DqunqZkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSm:FeIH2XgHq+jq93YoH

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks