General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-pgw5ysxglq

  • MD5

    13d7e2b6dc2c9faf6ec82676b911371d

  • SHA1

    c6e92ae3efad698f2da75c682dd2836152bf4c9c

  • SHA256

    d4527d45795d34e8a13a8941376b44ea4bf5f8efb6a92b236a237a8613f6278e

  • SHA512

    b56e31631d28462fdafa1602ebaa83e7cdfbbfe6c6d2caed2fe37c4e6a99d24c6bd3ec80229ddfd6af2e9cbd82c789227dbf822307954d18b3c47cdfc46bd125

  • SSDEEP

    98304:vbDjWM8JEE1r2lamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFI:vb0leNTfm/pf+xk4dWRptrbWOjgr/

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      13d7e2b6dc2c9faf6ec82676b911371d

    • SHA1

      c6e92ae3efad698f2da75c682dd2836152bf4c9c

    • SHA256

      d4527d45795d34e8a13a8941376b44ea4bf5f8efb6a92b236a237a8613f6278e

    • SHA512

      b56e31631d28462fdafa1602ebaa83e7cdfbbfe6c6d2caed2fe37c4e6a99d24c6bd3ec80229ddfd6af2e9cbd82c789227dbf822307954d18b3c47cdfc46bd125

    • SSDEEP

      98304:vbDjWM8JEE1r2lamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFI:vb0leNTfm/pf+xk4dWRptrbWOjgr/

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks