General

  • Target

    Built.exe

  • Size

    7.7MB

  • Sample

    241012-y7gmmatfjj

  • MD5

    c0dcfdc545083c0a4ae97f25be5a3223

  • SHA1

    1d62e51d31cfe2b71216ce9c99f12887dc497f5d

  • SHA256

    c1dcb83a8707fb1b49c181ffedca403928fc00df6f209ff3db8117fd00b29ef4

  • SHA512

    41a9d68c7ec47b5aabcfb07c5a4df24405201560b1d38f4d3ba4b01b5d6359f4878fbe76f0d10b6554d8cc43324239e0e4583c377f336dd7bb600b68b253a4ba

  • SSDEEP

    196608:Vi0D3eNTfm/pf+xk4dNSESRptrbWOjgrJ:JEy/pWu4m5RptrbvMrJ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.7MB

    • MD5

      c0dcfdc545083c0a4ae97f25be5a3223

    • SHA1

      1d62e51d31cfe2b71216ce9c99f12887dc497f5d

    • SHA256

      c1dcb83a8707fb1b49c181ffedca403928fc00df6f209ff3db8117fd00b29ef4

    • SHA512

      41a9d68c7ec47b5aabcfb07c5a4df24405201560b1d38f4d3ba4b01b5d6359f4878fbe76f0d10b6554d8cc43324239e0e4583c377f336dd7bb600b68b253a4ba

    • SSDEEP

      196608:Vi0D3eNTfm/pf+xk4dNSESRptrbWOjgrJ:JEy/pWu4m5RptrbvMrJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks