General

  • Target

    b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1N

  • Size

    7.6MB

  • Sample

    241010-yg7q5ayenp

  • MD5

    5b4fdf5480a5154079b5b40100e19ac0

  • SHA1

    b845db6ce615ef488e50bf68017374cbc555d4cd

  • SHA256

    b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1

  • SHA512

    407de7c958952894cf58ff38cd28126faa63ae923860bd64a69cca8621537ee43037c417b6ae065a1e20b4cdef6adec4fdb425d16b2c266511de7b6e4d1eabbb

  • SSDEEP

    196608:BzgVVEPwfI9jUC2gYBYv3vbW2+iITx1U6ny:WVVEEIH2gYBgDWJTnzy

Malware Config

Targets

    • Target

      b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1N

    • Size

      7.6MB

    • MD5

      5b4fdf5480a5154079b5b40100e19ac0

    • SHA1

      b845db6ce615ef488e50bf68017374cbc555d4cd

    • SHA256

      b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1

    • SHA512

      407de7c958952894cf58ff38cd28126faa63ae923860bd64a69cca8621537ee43037c417b6ae065a1e20b4cdef6adec4fdb425d16b2c266511de7b6e4d1eabbb

    • SSDEEP

      196608:BzgVVEPwfI9jUC2gYBYv3vbW2+iITx1U6ny:WVVEEIH2gYBgDWJTnzy

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks