General

  • Target

    ‏  ‍ .scr

  • Size

    8.2MB

  • Sample

    241010-zd347svhma

  • MD5

    65567dc307a634082ebaedf773b14ac6

  • SHA1

    5a00cfb44f125a67a2d01f7ed29504796007b98b

  • SHA256

    fa20dfcb3120e3a3b0fdf5b97a9f5d27dfe54c9f1145ba06b18e3c9d7e5c84fc

  • SHA512

    3c3342fe1a455c5302708dd9a6eac12234d21c957de74d7f5d602a417381930ba230aa536a1953ea9b7a3e77afb60d46474e02b2f71dea9f65134ce22565a6d9

  • SSDEEP

    196608:A5uyqZ9GwfI9jUC2XMvH8zPjweaBpZ0cISEu2ooccXK7oSX:5jtIH2XgHq+jq283Yo+

Malware Config

Targets

    • Target

      ‏  ‍ .scr

    • Size

      8.2MB

    • MD5

      65567dc307a634082ebaedf773b14ac6

    • SHA1

      5a00cfb44f125a67a2d01f7ed29504796007b98b

    • SHA256

      fa20dfcb3120e3a3b0fdf5b97a9f5d27dfe54c9f1145ba06b18e3c9d7e5c84fc

    • SHA512

      3c3342fe1a455c5302708dd9a6eac12234d21c957de74d7f5d602a417381930ba230aa536a1953ea9b7a3e77afb60d46474e02b2f71dea9f65134ce22565a6d9

    • SSDEEP

      196608:A5uyqZ9GwfI9jUC2XMvH8zPjweaBpZ0cISEu2ooccXK7oSX:5jtIH2XgHq+jq283Yo+

    Score
    10/10
    • Cats the Freakster

      my daddy freakster was mentioned in this file 🥵

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks