General

  • Target

    Built.exe

  • Size

    7.6MB

  • Sample

    241012-3ztpfaydja

  • MD5

    4def6c0a931b1f91b6c564545803a420

  • SHA1

    fd0e56d4cb8e3b359baf1db3bdd5649471f31d3c

  • SHA256

    5d9b6a087297faab1847e9b16b80ef0a56508425ec3763c4e6d3cbb047d59e79

  • SHA512

    bd7c8dd220c45e5c9de5243ce4e18a682f1cbd63d07d2aed7414f3fc5cfd68b6ff7de689cb2af257bf330609f5d75e439881adbdb511c32ba3bc991431e2b061

  • SSDEEP

    196608:BHaHYaEwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:9OIHziK1piXLGVE4Ue0VJU

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.6MB

    • MD5

      4def6c0a931b1f91b6c564545803a420

    • SHA1

      fd0e56d4cb8e3b359baf1db3bdd5649471f31d3c

    • SHA256

      5d9b6a087297faab1847e9b16b80ef0a56508425ec3763c4e6d3cbb047d59e79

    • SHA512

      bd7c8dd220c45e5c9de5243ce4e18a682f1cbd63d07d2aed7414f3fc5cfd68b6ff7de689cb2af257bf330609f5d75e439881adbdb511c32ba3bc991431e2b061

    • SSDEEP

      196608:BHaHYaEwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:9OIHziK1piXLGVE4Ue0VJU

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks