General

  • Target

    Loader.exe

  • Size

    7.5MB

  • Sample

    241011-k1794svgjb

  • MD5

    598f72402d65a23e0d3cf3b62dc7f8d8

  • SHA1

    4171fce35a5add0b3036ff9fb9ef3ef5961d7b81

  • SHA256

    1904a9b7fcab0323088596c84e47f11d4f9c1852ba32790be46886efe9f43cc8

  • SHA512

    8cb8a8bd72884d89e0907b090bb39f9f784509c7f6ee2c5912985fe0c253d0db031e40abeb65d0a277fde7b508795dfb81782f43434eb4234250f9d677e28c80

  • SSDEEP

    196608:DqunqZkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSm:FeIH2XgHq+jq93YoH

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.5MB

    • MD5

      598f72402d65a23e0d3cf3b62dc7f8d8

    • SHA1

      4171fce35a5add0b3036ff9fb9ef3ef5961d7b81

    • SHA256

      1904a9b7fcab0323088596c84e47f11d4f9c1852ba32790be46886efe9f43cc8

    • SHA512

      8cb8a8bd72884d89e0907b090bb39f9f784509c7f6ee2c5912985fe0c253d0db031e40abeb65d0a277fde7b508795dfb81782f43434eb4234250f9d677e28c80

    • SSDEEP

      196608:DqunqZkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSm:FeIH2XgHq+jq93YoH

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Obfuscated

      This file is very likely obfuscated.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks