General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-p8gvcawaja

  • MD5

    37fdeb9afa861599766d34e4acd09fae

  • SHA1

    a9c218633083ddb1b85e99ee7f253d49620cb262

  • SHA256

    46c9c3ac349b9a48f9c35ec8b1b3fe72b0a1fe096d6f1da1e2a9ca5841dd4e6d

  • SHA512

    28231cfcaf0ee1240b93c69f4aad4263e3f0224b77b0bf2d572a238ed0352c9573f8ad432c0021181137e0547e1715c078fcee311357a33130f46ef5a6a05fde

  • SSDEEP

    98304:Y3DjWM8JEE1rPMamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFL:Y30leNTfm/pf+xk4dWRptrbWOjgrQ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      37fdeb9afa861599766d34e4acd09fae

    • SHA1

      a9c218633083ddb1b85e99ee7f253d49620cb262

    • SHA256

      46c9c3ac349b9a48f9c35ec8b1b3fe72b0a1fe096d6f1da1e2a9ca5841dd4e6d

    • SHA512

      28231cfcaf0ee1240b93c69f4aad4263e3f0224b77b0bf2d572a238ed0352c9573f8ad432c0021181137e0547e1715c078fcee311357a33130f46ef5a6a05fde

    • SSDEEP

      98304:Y3DjWM8JEE1rPMamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFL:Y30leNTfm/pf+xk4dWRptrbWOjgrQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks