General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-rrwnaayhkb

  • MD5

    5d851ff0eda0787c43856933003e18b2

  • SHA1

    c17e64b7fc04f9f45ff4e333e2ece1710b55087c

  • SHA256

    3a891962b8b6eb09f6c19f36f79ddd942507655c25cc378ec021c7d85a3bab79

  • SHA512

    b695328cf2769d8e9e6ab87870e8213b473e34bc833e01f9d6fc7d6461c45202ccfaaca4109dd90e9723f169192cce26450893cf5b553ad3e42dda4f8fc50ea1

  • SSDEEP

    98304:3lDjWM8JEE1rHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFWu:3l0aeNTfm/pf+xk4dWRptrbWOjgrI

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      5d851ff0eda0787c43856933003e18b2

    • SHA1

      c17e64b7fc04f9f45ff4e333e2ece1710b55087c

    • SHA256

      3a891962b8b6eb09f6c19f36f79ddd942507655c25cc378ec021c7d85a3bab79

    • SHA512

      b695328cf2769d8e9e6ab87870e8213b473e34bc833e01f9d6fc7d6461c45202ccfaaca4109dd90e9723f169192cce26450893cf5b553ad3e42dda4f8fc50ea1

    • SSDEEP

      98304:3lDjWM8JEE1rHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFWu:3l0aeNTfm/pf+xk4dWRptrbWOjgrI

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks