General

  • Target

    Built.exe

  • Size

    10.0MB

  • Sample

    241013-2effms1hrb

  • MD5

    e3f0a3248b2084fe1ab9a11ce10fe3c5

  • SHA1

    e15f23f2e1981062318ebc384d11af8e015ade10

  • SHA256

    97a01eea8c647df06b278b0651de28bb60f615da3fc00ef2e08a363b3fd33770

  • SHA512

    f6662bcf47dbaecff36aaddc2da0ee41d6f1c07fe2e3591fef5db6c2f3123d3857577d66834801b5d94a7d577294a3ef654b200992ba2dd528f50a218b7c8fdb

  • SSDEEP

    196608:WjFbeyAeN/FJMIDJf0gsAGK5SEQRzuAKw9RW:iv/Fqyf0gsfNiAKJ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      10.0MB

    • MD5

      e3f0a3248b2084fe1ab9a11ce10fe3c5

    • SHA1

      e15f23f2e1981062318ebc384d11af8e015ade10

    • SHA256

      97a01eea8c647df06b278b0651de28bb60f615da3fc00ef2e08a363b3fd33770

    • SHA512

      f6662bcf47dbaecff36aaddc2da0ee41d6f1c07fe2e3591fef5db6c2f3123d3857577d66834801b5d94a7d577294a3ef654b200992ba2dd528f50a218b7c8fdb

    • SSDEEP

      196608:WjFbeyAeN/FJMIDJf0gsAGK5SEQRzuAKw9RW:iv/Fqyf0gsfNiAKJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks