General

  • Target

    hitboxyfivem2024.exe

  • Size

    10.0MB

  • Sample

    241010-ht164swdqk

  • MD5

    dc6b9eaa417ac380895dfd554c0ff29d

  • SHA1

    3976703a1e78d1445f72a528f4869e294eeea8e3

  • SHA256

    850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65

  • SHA512

    737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb

  • SSDEEP

    196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr

Malware Config

Targets

    • Target

      hitboxyfivem2024.exe

    • Size

      10.0MB

    • MD5

      dc6b9eaa417ac380895dfd554c0ff29d

    • SHA1

      3976703a1e78d1445f72a528f4869e294eeea8e3

    • SHA256

      850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65

    • SHA512

      737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb

    • SSDEEP

      196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks