General

  • Target

    Image Logger.exe

  • Size

    7.5MB

  • Sample

    241017-2dbq3atbrr

  • MD5

    8035fb095835453326a0c57217d5006a

  • SHA1

    8881f8dcbe63b0620022213a65a189f35479d477

  • SHA256

    1c00e69d52df9eff9f68fdf941e9c2d065588007635682a3a0b532c4f0620554

  • SHA512

    eba4b97192a41c6fad8f36b7d7a9cfbfa6ff8e70ce3c57946d39500fb47b6d17b87fc1c0e09d6dde6e690c80d5b4d5f3db4091f4aa3509c352db7d4352ba6dc9

  • SSDEEP

    196608:7TgVVEcwfI9jUC2gYBYv3vbW2+iITx1U6nu:oVVEDIH2gYBgDWJTnzu

Malware Config

Targets

    • Target

      Image Logger.exe

    • Size

      7.5MB

    • MD5

      8035fb095835453326a0c57217d5006a

    • SHA1

      8881f8dcbe63b0620022213a65a189f35479d477

    • SHA256

      1c00e69d52df9eff9f68fdf941e9c2d065588007635682a3a0b532c4f0620554

    • SHA512

      eba4b97192a41c6fad8f36b7d7a9cfbfa6ff8e70ce3c57946d39500fb47b6d17b87fc1c0e09d6dde6e690c80d5b4d5f3db4091f4aa3509c352db7d4352ba6dc9

    • SSDEEP

      196608:7TgVVEcwfI9jUC2gYBYv3vbW2+iITx1U6nu:oVVEDIH2gYBgDWJTnzu

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks