General

  • Target

    Synapse X.exe

  • Size

    8.2MB

  • Sample

    241013-jkhh3szdrq

  • MD5

    1f3840bb0e05da77a00c9c73c213c967

  • SHA1

    33fc00a415e0fd3ed8337a7da9bd7f2a1af9c9ca

  • SHA256

    6e1081e1997ffb076867f449f13778e5a58c98e6333def8b3fd539af5ef6ec21

  • SHA512

    bc22201f4cc7bfee332f12261eb4cce36173687821b0c268905789dd8a6da4ec5a49fb39d6cb4d75e522ce5a2518d8c497968daacb84d2e30b6b90e89bb76fbf

  • SSDEEP

    196608:RdJgurErvI9pWjgyvoaYrE41JISXCnICoxt:FgurEUWjdo/H1JpyDo3

Malware Config

Targets

    • Target

      Synapse X.exe

    • Size

      8.2MB

    • MD5

      1f3840bb0e05da77a00c9c73c213c967

    • SHA1

      33fc00a415e0fd3ed8337a7da9bd7f2a1af9c9ca

    • SHA256

      6e1081e1997ffb076867f449f13778e5a58c98e6333def8b3fd539af5ef6ec21

    • SHA512

      bc22201f4cc7bfee332f12261eb4cce36173687821b0c268905789dd8a6da4ec5a49fb39d6cb4d75e522ce5a2518d8c497968daacb84d2e30b6b90e89bb76fbf

    • SSDEEP

      196608:RdJgurErvI9pWjgyvoaYrE41JISXCnICoxt:FgurEUWjdo/H1JpyDo3

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks