Resubmissions

15-10-2024 15:51

241015-tapjrashkh 10

15-10-2024 15:23

241015-sszxrs1hle 10

General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-tapjrashkh

  • MD5

    292930cf8424cc4f326496659d841539

  • SHA1

    654d24c6266ae4b1c9dd46c3dcc3da1640233146

  • SHA256

    274d40c02c31eb2fcb5b9703a716a6c46b48b72a2ef3d886dd0b2587745c0d81

  • SHA512

    df3c73b3b6148ce29f82d4882f56a8ca52f341bd5b832efd4c0e09932a444d155850a6baa421e9fab7699e333c3ab6c4d2165bd338c764d37384021d835c0989

  • SSDEEP

    98304:ICDjWM8JEE1rM9a3amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEr:IC0Ia6eNTfm/pf+xk4dWRptrbWOjgrV

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      292930cf8424cc4f326496659d841539

    • SHA1

      654d24c6266ae4b1c9dd46c3dcc3da1640233146

    • SHA256

      274d40c02c31eb2fcb5b9703a716a6c46b48b72a2ef3d886dd0b2587745c0d81

    • SHA512

      df3c73b3b6148ce29f82d4882f56a8ca52f341bd5b832efd4c0e09932a444d155850a6baa421e9fab7699e333c3ab6c4d2165bd338c764d37384021d835c0989

    • SSDEEP

      98304:ICDjWM8JEE1rM9a3amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEr:IC0Ia6eNTfm/pf+xk4dWRptrbWOjgrV

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks