General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    241014-qzt9raxhqh

  • MD5

    56dc67e45d4b92f10b93f593ba0a0f12

  • SHA1

    fa3851e48e04f1a57a46407be19a720d52f1cc92

  • SHA256

    67438ba5968d015811fc045d557ba1edd1e3bf563ecd9a8d9140e6bfad781737

  • SHA512

    adeb8e5cf864b872a246a20312323197b9fcfbeb34cac0ea5b5f24fa17bc0221376e94b3b6f15c9bc8ad283df49a3e17538947bfe90fae22c7fb1f57ce400bcb

  • SSDEEP

    98304:YnEtdFBGjamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RuOuAK5QnNeyE:YWFEGeN/FJMIDJf0gsAGK4RtuAK5GFE

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      56dc67e45d4b92f10b93f593ba0a0f12

    • SHA1

      fa3851e48e04f1a57a46407be19a720d52f1cc92

    • SHA256

      67438ba5968d015811fc045d557ba1edd1e3bf563ecd9a8d9140e6bfad781737

    • SHA512

      adeb8e5cf864b872a246a20312323197b9fcfbeb34cac0ea5b5f24fa17bc0221376e94b3b6f15c9bc8ad283df49a3e17538947bfe90fae22c7fb1f57ce400bcb

    • SSDEEP

      98304:YnEtdFBGjamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RuOuAK5QnNeyE:YWFEGeN/FJMIDJf0gsAGK4RtuAK5GFE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �.pyc

    • Size

      857B

    • MD5

      cb71c4e8c966bb4c50cbaef054ceb246

    • SHA1

      90874ad352f9458fa41296da18b04b0e5217702a

    • SHA256

      82d419595cfba6f9390de99c77240546370621d24b8719f1bc9e124c871a172c

    • SHA512

      0b26ed3e0236e77092b9acb80a25e1e6696e699b7af43f4ee32becaf1aeb8d73809b6816e6ebe0b9f4b7a9dd2b0b19e96e69f1946b9485b4746397cf654c401f

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks