General

  • Target

    f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573

  • Size

    6.9MB

  • Sample

    241015-htbapavenp

  • MD5

    363a21f6e94c928743432fca85a72403

  • SHA1

    461b86b519021ac9d86920f522b2b7e2180a27fd

  • SHA256

    f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573

  • SHA512

    3fca23c9bcd5f89d70664f2a034ee4f6254348c7f78e644d19c691f3329458c779ee28a8677f48057a24b6ae250695352b64ae027304b6b096c51bcd2bb6f27a

  • SSDEEP

    98304:euzHqdVfB2FS27wByuT/9vUIdD9C+z3zO917vOTh+ezDNh75vmJ1nmOBN9n4mUMX:euQsIbT/9bvLz3S1bA3z4n975

Malware Config

Targets

    • Target

      f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573

    • Size

      6.9MB

    • MD5

      363a21f6e94c928743432fca85a72403

    • SHA1

      461b86b519021ac9d86920f522b2b7e2180a27fd

    • SHA256

      f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573

    • SHA512

      3fca23c9bcd5f89d70664f2a034ee4f6254348c7f78e644d19c691f3329458c779ee28a8677f48057a24b6ae250695352b64ae027304b6b096c51bcd2bb6f27a

    • SSDEEP

      98304:euzHqdVfB2FS27wByuT/9vUIdD9C+z3zO917vOTh+ezDNh75vmJ1nmOBN9n4mUMX:euQsIbT/9bvLz3S1bA3z4n975

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks