General

  • Target

    runme.exe

  • Size

    8.2MB

  • Sample

    241017-wkllysxfjd

  • MD5

    5e0396e2fa0c3e23b3aa36120f18f0c7

  • SHA1

    2ca56a354180259546d531258a3647e4726c778a

  • SHA256

    7f28fe133b4387bae944678c26a4ae9c5e90ea44de13e88739bb75eac193850f

  • SHA512

    ba093e40967dd4ff35dfe37d085e0c4b82f62f71813183c97f8197480ba004242d0f520e54c8e39fd840adbb64cb085f630cc7f8c16890d43523961d93f7630d

  • SSDEEP

    196608:DfLjv+bhqNVoBLD7fEXEoYbiIv9VSE8vvk9fIihJ5m:XL+9qz8LD7fEUbiI64Qcjm

Malware Config

Targets

    • Target

      runme.exe

    • Size

      8.2MB

    • MD5

      5e0396e2fa0c3e23b3aa36120f18f0c7

    • SHA1

      2ca56a354180259546d531258a3647e4726c778a

    • SHA256

      7f28fe133b4387bae944678c26a4ae9c5e90ea44de13e88739bb75eac193850f

    • SHA512

      ba093e40967dd4ff35dfe37d085e0c4b82f62f71813183c97f8197480ba004242d0f520e54c8e39fd840adbb64cb085f630cc7f8c16890d43523961d93f7630d

    • SSDEEP

      196608:DfLjv+bhqNVoBLD7fEXEoYbiIv9VSE8vvk9fIihJ5m:XL+9qz8LD7fEUbiI64Qcjm

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��cv� .pyc

    • Size

      1KB

    • MD5

      df2f6e0cdf967b30993bf229950260d0

    • SHA1

      10a5b1b0376524695079eda5a7300d9e248512e8

    • SHA256

      79d9190c90e338638e7e65465346aa3cc2d2f175f869d54673ee52fe30d5e775

    • SHA512

      9bbecc510642e5a9309f9ecc6c27ed758805ff3c9453221297149a131a6789015640b52d38bfe54d75fb4a67b3aaeaf665d7e8d3ff1e71f5b778202f361b4c27

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks