General

  • Target

    loader.exe

  • Size

    7.4MB

  • Sample

    241014-f2229svakp

  • MD5

    4d662bb483557cae6c840302696b8d4f

  • SHA1

    7b0bb6f7b8e58a0840e32ea1faf0776013980cc6

  • SHA256

    8ae52f6852caea6485e55ec421a80696fe264447f122cde7017380892718eb88

  • SHA512

    ca4ed1ea327172d6fd9f3f1a51d233743f711de89fbf9246ddc8c1035449352855903f022a316841fd6f1272287f12e2cc49fa6008b07f6783c1ee31a596db29

  • SSDEEP

    98304:zqSi8x9XQsTurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112K:zNP9VTurErvI9pWjgfPvzm6gsFE14AZ

Malware Config

Targets

    • Target

      loader.exe

    • Size

      7.4MB

    • MD5

      4d662bb483557cae6c840302696b8d4f

    • SHA1

      7b0bb6f7b8e58a0840e32ea1faf0776013980cc6

    • SHA256

      8ae52f6852caea6485e55ec421a80696fe264447f122cde7017380892718eb88

    • SHA512

      ca4ed1ea327172d6fd9f3f1a51d233743f711de89fbf9246ddc8c1035449352855903f022a316841fd6f1272287f12e2cc49fa6008b07f6783c1ee31a596db29

    • SSDEEP

      98304:zqSi8x9XQsTurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112K:zNP9VTurErvI9pWjgfPvzm6gsFE14AZ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks