General

  • Target

    hitboxy fivem 2024.exe

  • Size

    10.0MB

  • Sample

    241010-hqwr8azhjb

  • MD5

    dc6b9eaa417ac380895dfd554c0ff29d

  • SHA1

    3976703a1e78d1445f72a528f4869e294eeea8e3

  • SHA256

    850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65

  • SHA512

    737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb

  • SSDEEP

    196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr

Malware Config

Targets

    • Target

      hitboxy fivem 2024.exe

    • Size

      10.0MB

    • MD5

      dc6b9eaa417ac380895dfd554c0ff29d

    • SHA1

      3976703a1e78d1445f72a528f4869e294eeea8e3

    • SHA256

      850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65

    • SHA512

      737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb

    • SSDEEP

      196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �u-�U��.pyc

    • Size

      857B

    • MD5

      7928c58dc860f84b2da3da2250ce8bf9

    • SHA1

      45d307d65d8c3862187ae6dd0178ab3b98a9d476

    • SHA256

      c1c3472776646d9223eb05d230a6a3ab02901c5b4e8a49b31a3e0526deef8e2a

    • SHA512

      8bdd3ba4391ba682f76707a7fc2bd57a3ff8f06cc9b4d37b88aa5ddc4e3bdd0268bb35a21b377ca70e5f15c48ba7880242cb5a806cb5b81613092fd1350d4b2c

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks