General

  • Target

    runme.exe

  • Size

    8.2MB

  • Sample

    241017-wlak3s1blm

  • MD5

    5e0396e2fa0c3e23b3aa36120f18f0c7

  • SHA1

    2ca56a354180259546d531258a3647e4726c778a

  • SHA256

    7f28fe133b4387bae944678c26a4ae9c5e90ea44de13e88739bb75eac193850f

  • SHA512

    ba093e40967dd4ff35dfe37d085e0c4b82f62f71813183c97f8197480ba004242d0f520e54c8e39fd840adbb64cb085f630cc7f8c16890d43523961d93f7630d

  • SSDEEP

    196608:DfLjv+bhqNVoBLD7fEXEoYbiIv9VSE8vvk9fIihJ5m:XL+9qz8LD7fEUbiI64Qcjm

Malware Config

Targets

    • Target

      runme.exe

    • Size

      8.2MB

    • MD5

      5e0396e2fa0c3e23b3aa36120f18f0c7

    • SHA1

      2ca56a354180259546d531258a3647e4726c778a

    • SHA256

      7f28fe133b4387bae944678c26a4ae9c5e90ea44de13e88739bb75eac193850f

    • SHA512

      ba093e40967dd4ff35dfe37d085e0c4b82f62f71813183c97f8197480ba004242d0f520e54c8e39fd840adbb64cb085f630cc7f8c16890d43523961d93f7630d

    • SSDEEP

      196608:DfLjv+bhqNVoBLD7fEXEoYbiIv9VSE8vvk9fIihJ5m:XL+9qz8LD7fEUbiI64Qcjm

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks