General

  • Target

    osuhack.exe

  • Size

    8.2MB

  • Sample

    241012-tl51wayfkb

  • MD5

    e8d93965e67837d3b69b702fccd2f1b4

  • SHA1

    668e40b70a160286b9fef7928e358f6d2af496f2

  • SHA256

    4c6c67abcd02db5d53b3adca370958ec38c6b98ab653788fa7b7662f40108c74

  • SHA512

    2c8f16749f4d63afdef0b40bd2c329870ff1ba1075a62dad079bd89a9644b98f2d4083ea6d763052393494fe41e2ae4aab8fb3e02adfeb3c4ca8fb39269401f4

  • SSDEEP

    196608:mkQXwuLbkurErvI9pWjgN3ZdahF0pbH1AYSEp7CtQsNI/Sx3C1+:/jurEUWjqeWxQR6nAY+

Malware Config

Targets

    • Target

      osuhack.exe

    • Size

      8.2MB

    • MD5

      e8d93965e67837d3b69b702fccd2f1b4

    • SHA1

      668e40b70a160286b9fef7928e358f6d2af496f2

    • SHA256

      4c6c67abcd02db5d53b3adca370958ec38c6b98ab653788fa7b7662f40108c74

    • SHA512

      2c8f16749f4d63afdef0b40bd2c329870ff1ba1075a62dad079bd89a9644b98f2d4083ea6d763052393494fe41e2ae4aab8fb3e02adfeb3c4ca8fb39269401f4

    • SSDEEP

      196608:mkQXwuLbkurErvI9pWjgN3ZdahF0pbH1AYSEp7CtQsNI/Sx3C1+:/jurEUWjqeWxQR6nAY+

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks