General

  • Target

    Loader.exe

  • Size

    7.7MB

  • Sample

    241014-nefvhsydnr

  • MD5

    7c81d7e839d2dbc360c758e43a688282

  • SHA1

    4d70a19d17a40041a4781979949b83a02f45c116

  • SHA256

    b87be0acf41b31a187e0fde9788c167c488465f32bf8e62ebe19a816445580d9

  • SHA512

    b70a705f5e7af34daded250b93feba65659fbd619c65fc1d9f5a2ef93795bc6556bb969cba65e409d9bb0b8f67138c55673c31ec711266630626f2da56b289a8

  • SSDEEP

    196608:ThunqZYkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSe:w5IH2XgHq+jq93Yo3

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.7MB

    • MD5

      7c81d7e839d2dbc360c758e43a688282

    • SHA1

      4d70a19d17a40041a4781979949b83a02f45c116

    • SHA256

      b87be0acf41b31a187e0fde9788c167c488465f32bf8e62ebe19a816445580d9

    • SHA512

      b70a705f5e7af34daded250b93feba65659fbd619c65fc1d9f5a2ef93795bc6556bb969cba65e409d9bb0b8f67138c55673c31ec711266630626f2da56b289a8

    • SSDEEP

      196608:ThunqZYkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSe:w5IH2XgHq+jq93Yo3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      5^�$Hi.pyc

    • Size

      1KB

    • MD5

      614fd9ff598e893e7295d783bcadce89

    • SHA1

      fa49830cfd3a0b389f5418362f373b6bfc324fb0

    • SHA256

      bd5db6e29384a7000bd1772f8a231b9dfc4f30c1356a3f8ce2fb684d3033f9b5

    • SHA512

      220c647b6106fc73fbd5ffb62becf7f3952a318edde1f94ed4f7380b711c53b885ab7299b2671db4a09c0cc74dad145f4e0cf7908df241269301864bbfc06f7b

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks