General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-sjrvssvgkr

  • MD5

    19d57843d20ec66fdab46eccc476105a

  • SHA1

    8d6c8f180d519f59ac8155b100f05a39d7653e5b

  • SHA256

    0cabc7775f53ab4b872d3f1578ba734355d593278c5d0cba7ac1bac94b222696

  • SHA512

    13d7a618ceeca100f9d16898500de86c4732679f2d91a063bfa15d49d9502646a476c9f42845905f108e755c483760adb6ef08fbc4f4e1c6f0dbf2b603d91bae

  • SSDEEP

    98304:RyDjWM8JEE1rAx6/amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEc:Ry02eNTfm/pf+xk4dWRptrbWOjgrS

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      19d57843d20ec66fdab46eccc476105a

    • SHA1

      8d6c8f180d519f59ac8155b100f05a39d7653e5b

    • SHA256

      0cabc7775f53ab4b872d3f1578ba734355d593278c5d0cba7ac1bac94b222696

    • SHA512

      13d7a618ceeca100f9d16898500de86c4732679f2d91a063bfa15d49d9502646a476c9f42845905f108e755c483760adb6ef08fbc4f4e1c6f0dbf2b603d91bae

    • SSDEEP

      98304:RyDjWM8JEE1rAx6/amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEc:Ry02eNTfm/pf+xk4dWRptrbWOjgrS

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks