General

  • Target

    Gaia_4.0updated.exe

  • Size

    6.9MB

  • Sample

    241019-lmwjts1dqj

  • MD5

    32fb61ef7672686bf3761fc691ebee12

  • SHA1

    8101f361e5992a9ea54a32c43bf805f4d0facd5c

  • SHA256

    a64dbb3b319482243d89f68420fc8a53e42f4f0cafc90de2ad1ae81da0133260

  • SHA512

    92931c4668e056015cb04b5243fcc9fa74810c800555160442e6a9925f213370232567872f43d9a4b3eba98a236b4203be11bfbdc762f57c1ca84eaaab92a297

  • SSDEEP

    98304:/wDjWM8JEE1rmaamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFu:/w0WzeNTfm/pf+xk4dWRatrbWOjgKQ

Malware Config

Targets

    • Target

      Gaia_4.0updated.exe

    • Size

      6.9MB

    • MD5

      32fb61ef7672686bf3761fc691ebee12

    • SHA1

      8101f361e5992a9ea54a32c43bf805f4d0facd5c

    • SHA256

      a64dbb3b319482243d89f68420fc8a53e42f4f0cafc90de2ad1ae81da0133260

    • SHA512

      92931c4668e056015cb04b5243fcc9fa74810c800555160442e6a9925f213370232567872f43d9a4b3eba98a236b4203be11bfbdc762f57c1ca84eaaab92a297

    • SSDEEP

      98304:/wDjWM8JEE1rmaamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFu:/w0WzeNTfm/pf+xk4dWRatrbWOjgKQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks