General

  • Target

    Loader.exe

  • Size

    7.7MB

  • Sample

    241014-nmn6vsyeqj

  • MD5

    7c81d7e839d2dbc360c758e43a688282

  • SHA1

    4d70a19d17a40041a4781979949b83a02f45c116

  • SHA256

    b87be0acf41b31a187e0fde9788c167c488465f32bf8e62ebe19a816445580d9

  • SHA512

    b70a705f5e7af34daded250b93feba65659fbd619c65fc1d9f5a2ef93795bc6556bb969cba65e409d9bb0b8f67138c55673c31ec711266630626f2da56b289a8

  • SSDEEP

    196608:ThunqZYkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSe:w5IH2XgHq+jq93Yo3

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.7MB

    • MD5

      7c81d7e839d2dbc360c758e43a688282

    • SHA1

      4d70a19d17a40041a4781979949b83a02f45c116

    • SHA256

      b87be0acf41b31a187e0fde9788c167c488465f32bf8e62ebe19a816445580d9

    • SHA512

      b70a705f5e7af34daded250b93feba65659fbd619c65fc1d9f5a2ef93795bc6556bb969cba65e409d9bb0b8f67138c55673c31ec711266630626f2da56b289a8

    • SSDEEP

      196608:ThunqZYkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSe:w5IH2XgHq+jq93Yo3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks