General

  • Target

    8d43c698222164b663d8bcf46eaa82947a7df712984570472eb31f81bf167c9e.exe

  • Size

    7.5MB

  • Sample

    241011-jvgpjaycll

  • MD5

    11b6557986da2fe9bb31dc3a72170d6f

  • SHA1

    c6964f84ef1aa1e09d2db5a83f44819d6294d91f

  • SHA256

    8d43c698222164b663d8bcf46eaa82947a7df712984570472eb31f81bf167c9e

  • SHA512

    127fd53fc20dc9ec732198aed661698ce15da81e46df33c2894ea1646c205d94c89d4399b2be1b642c726fb910570bd6f7fa5d749683202673514121203a3f90

  • SSDEEP

    196608:Lx8wLSurErvI9pWjg/Qc+4o673pNrabePNNrStMXWTNJe:uurEUWjZZ4dDLIeF1StYwNJe

Malware Config

Targets

    • Target

      8d43c698222164b663d8bcf46eaa82947a7df712984570472eb31f81bf167c9e.exe

    • Size

      7.5MB

    • MD5

      11b6557986da2fe9bb31dc3a72170d6f

    • SHA1

      c6964f84ef1aa1e09d2db5a83f44819d6294d91f

    • SHA256

      8d43c698222164b663d8bcf46eaa82947a7df712984570472eb31f81bf167c9e

    • SHA512

      127fd53fc20dc9ec732198aed661698ce15da81e46df33c2894ea1646c205d94c89d4399b2be1b642c726fb910570bd6f7fa5d749683202673514121203a3f90

    • SSDEEP

      196608:Lx8wLSurErvI9pWjg/Qc+4o673pNrabePNNrStMXWTNJe:uurEUWjZZ4dDLIeF1StYwNJe

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks