General

  • Target

    Relikeas4v4 Privado.exe

  • Size

    7.5MB

  • Sample

    241017-zcy4vsxhlp

  • MD5

    c67e114c519bdc525afcf7e118814a70

  • SHA1

    a7c5904f8472a7b3fb5f278488d122bda4e8b8a4

  • SHA256

    bc9a011fdb36439c6e6a89b748735008ae329e8fdfebbceae1fd8b258a0d11c8

  • SHA512

    177b8d94161a14435dfd20698f51cc403a1fa3f381b1ee0d6285adb3331ee5c49ac17edf2cb5afb5839ffb1f72f0c37c6a02e4914701dfa97407eeaa9a25240f

  • SSDEEP

    196608:ncunqZ0wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSg:PmIH2XgHq+jq93YoV

Malware Config

Targets

    • Target

      Relikeas4v4 Privado.exe

    • Size

      7.5MB

    • MD5

      c67e114c519bdc525afcf7e118814a70

    • SHA1

      a7c5904f8472a7b3fb5f278488d122bda4e8b8a4

    • SHA256

      bc9a011fdb36439c6e6a89b748735008ae329e8fdfebbceae1fd8b258a0d11c8

    • SHA512

      177b8d94161a14435dfd20698f51cc403a1fa3f381b1ee0d6285adb3331ee5c49ac17edf2cb5afb5839ffb1f72f0c37c6a02e4914701dfa97407eeaa9a25240f

    • SSDEEP

      196608:ncunqZ0wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSg:PmIH2XgHq+jq93YoV

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �k�6��.pyc

    • Size

      1KB

    • MD5

      432afd3a7c9b8de91bcea8bde2eb8934

    • SHA1

      f1b0e1d15c69c8a261b9deb4c7f7ed62b10bc19c

    • SHA256

      2450dcd44924986a1ba6eeeb90d6a172f00560874b2f3b2ad4cb12f6534c5964

    • SHA512

      a5e9e878f45450f791885a287a611c7c801262e2f8b8c85287e01a8eefef9e4d9dfb83e9b7f9cd13bf85d5b2a1ce7b1ef1616af3115214055e380c066a8e202f

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks