General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-rtvtrstdnr

  • MD5

    300e43489384ceccb047d7a57a9fedcb

  • SHA1

    db8d7c035b062b9c345d2d032bb531ed6057cd9a

  • SHA256

    cc38e6c8d99643e6de8b2329f7eeb93aff447a20047f595e1a7b745bb7bc2b9d

  • SHA512

    388e4b4139b3950d4f4cbf880a1c12f5076c6b97485b007b8faa9a1e5821f2dff6e1d077e014b9ecbce21096dbffd64c5b28aa5771ed08739ac0e77177e80ad0

  • SSDEEP

    98304:eYDjWM8JEE1r6iUVamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEf:eY0qireNTfm/pf+xk4dWRptrbWOjgrF

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      300e43489384ceccb047d7a57a9fedcb

    • SHA1

      db8d7c035b062b9c345d2d032bb531ed6057cd9a

    • SHA256

      cc38e6c8d99643e6de8b2329f7eeb93aff447a20047f595e1a7b745bb7bc2b9d

    • SHA512

      388e4b4139b3950d4f4cbf880a1c12f5076c6b97485b007b8faa9a1e5821f2dff6e1d077e014b9ecbce21096dbffd64c5b28aa5771ed08739ac0e77177e80ad0

    • SSDEEP

      98304:eYDjWM8JEE1r6iUVamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEf:eY0qireNTfm/pf+xk4dWRptrbWOjgrF

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks