General

  • Target

    Blank_grabber.exe

  • Size

    7.5MB

  • Sample

    241012-t1y6wathnp

  • MD5

    a87b075468e0adddb4e9bf7dfc4a9d3f

  • SHA1

    37aafeb89ece8170a9c97ab0beccdeb77d992b82

  • SHA256

    7ae9f50002ad8be6a792c9474d1f76273d0c8dd9c569d685f72e5eff33bc47fb

  • SHA512

    0316bad04047bba56c90984a2635878f4d78d6c996b8f317705cd20f64ac45911fd5ebaef387ee55049852e2811373a048d736353f45bd805505be537b1880ad

  • SSDEEP

    196608:aggVVE6/YwfI9jUC2gYBYv3vbW2+iITx1U6n+:0VVEgIH2gYBgDWJTnz+

Malware Config

Targets

    • Target

      Blank_grabber.exe

    • Size

      7.5MB

    • MD5

      a87b075468e0adddb4e9bf7dfc4a9d3f

    • SHA1

      37aafeb89ece8170a9c97ab0beccdeb77d992b82

    • SHA256

      7ae9f50002ad8be6a792c9474d1f76273d0c8dd9c569d685f72e5eff33bc47fb

    • SHA512

      0316bad04047bba56c90984a2635878f4d78d6c996b8f317705cd20f64ac45911fd5ebaef387ee55049852e2811373a048d736353f45bd805505be537b1880ad

    • SSDEEP

      196608:aggVVE6/YwfI9jUC2gYBYv3vbW2+iITx1U6n+:0VVEgIH2gYBgDWJTnz+

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks