General

  • Target

    Setup_Cursed54.exe

  • Size

    7.5MB

  • Sample

    241012-an74gawgrq

  • MD5

    ca6cd3613e501589bab37c63aff517e1

  • SHA1

    a4c7b7a4014aff06b738575c145b37b20a3a21d5

  • SHA256

    c7af0903c43fe46ecfac697a6cad34aab4b3b43dd93e14db056b0aa4193db68e

  • SHA512

    cb0e6cdcc5a0afdc17ee39df1ee61d94f4da313d05dbb05251364ec6c5ccbda21b89541f5f2f25c34fce17d7fc4cdd600b47996b3a1489f58467147e2f010d20

  • SSDEEP

    196608:3BgVVEexhwfI9jUC2gYBYv3vbW2+iITx1U6nE:SVVEA+IH2gYBgDWJTnzE

Malware Config

Targets

    • Target

      Setup_Cursed54.exe

    • Size

      7.5MB

    • MD5

      ca6cd3613e501589bab37c63aff517e1

    • SHA1

      a4c7b7a4014aff06b738575c145b37b20a3a21d5

    • SHA256

      c7af0903c43fe46ecfac697a6cad34aab4b3b43dd93e14db056b0aa4193db68e

    • SHA512

      cb0e6cdcc5a0afdc17ee39df1ee61d94f4da313d05dbb05251364ec6c5ccbda21b89541f5f2f25c34fce17d7fc4cdd600b47996b3a1489f58467147e2f010d20

    • SSDEEP

      196608:3BgVVEexhwfI9jUC2gYBYv3vbW2+iITx1U6nE:SVVEA+IH2gYBgDWJTnzE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks