General

  • Target

    upx.exe

  • Size

    8.0MB

  • Sample

    241017-tvycdsxemq

  • MD5

    fa5cff7dddd57daaa7b71f5e4f8cc892

  • SHA1

    27f9eb4d027acfead1ae18202c3d67314d82a30f

  • SHA256

    d1aa6e6238a77909090a9bc023ca5a010dcb3fde2e051aeca42784def2aa7c6a

  • SHA512

    188ab16162f3ba747ed7595759e589d548ccf8799167460ad01d7960a29074c7b720552f99d421cc5a2f3f62bae02020b31f45ec76aa1408a2e94f56b55a6309

  • SSDEEP

    196608:VIegVVEUgw4PwfI9jUC2gYBYv3vbW2+iITx1U6n5:eVVEduIH2gYBgDWJTnz5

Malware Config

Targets

    • Target

      upx.exe

    • Size

      8.0MB

    • MD5

      fa5cff7dddd57daaa7b71f5e4f8cc892

    • SHA1

      27f9eb4d027acfead1ae18202c3d67314d82a30f

    • SHA256

      d1aa6e6238a77909090a9bc023ca5a010dcb3fde2e051aeca42784def2aa7c6a

    • SHA512

      188ab16162f3ba747ed7595759e589d548ccf8799167460ad01d7960a29074c7b720552f99d421cc5a2f3f62bae02020b31f45ec76aa1408a2e94f56b55a6309

    • SSDEEP

      196608:VIegVVEUgw4PwfI9jUC2gYBYv3vbW2+iITx1U6n5:eVVEduIH2gYBgDWJTnz5

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks