General

  • Target

    Built.exe

  • Size

    7.5MB

  • Sample

    241012-26nw4awgng

  • MD5

    4faed207c50d4b3ef6aabdac60bdda2c

  • SHA1

    fc111cca12c342ffb2e56150ee68b01b41b6e8ed

  • SHA256

    0d46311d4b5b20746fbeaeb16f00ef265c254fa6f81b564640c015232f83252e

  • SHA512

    5dbd6959bde2caf57c49fad80972a9117208c2da00cdd0a7a74d00348e3a41076bc92626e49d0e3bd59476b1ef21b73dbd967a3e15a6e1535b29a8384690c0de

  • SSDEEP

    196608:owhBGurErvI9pWjg/Qc+4o673pNrabenyzWGPMYnN9si:ZGurEUWjZZ4dDLIeyzWGPTNCi

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.5MB

    • MD5

      4faed207c50d4b3ef6aabdac60bdda2c

    • SHA1

      fc111cca12c342ffb2e56150ee68b01b41b6e8ed

    • SHA256

      0d46311d4b5b20746fbeaeb16f00ef265c254fa6f81b564640c015232f83252e

    • SHA512

      5dbd6959bde2caf57c49fad80972a9117208c2da00cdd0a7a74d00348e3a41076bc92626e49d0e3bd59476b1ef21b73dbd967a3e15a6e1535b29a8384690c0de

    • SSDEEP

      196608:owhBGurErvI9pWjg/Qc+4o673pNrabenyzWGPMYnN9si:ZGurEUWjZZ4dDLIeyzWGPTNCi

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��U�z.pyc

    • Size

      1KB

    • MD5

      417ca489e02f0293b714068b4aa5bb09

    • SHA1

      2790b2f64b99fafdd009b31f954f12eae9c609bc

    • SHA256

      369527f48f62c720abdf109cdcd4d21bc21f487c3af6a3cb78902284b1cfe8a8

    • SHA512

      e57066ada6541565d7b0a8c86a203b3e40a8031a0b497d4a0bae386e3269e18d64bc3468d208cc2cdad92bf52d14e7d21d5b4aab574ce48ab5c3f7578005c800

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks