General

  • Target

    paywallBypassorNew.exe

  • Size

    6.0MB

  • Sample

    241020-2gmmqstgmc

  • MD5

    5954fdd06f101977e43eabb2430df142

  • SHA1

    b7be981fea90b95bb673ce8726420ae0c60cdbf8

  • SHA256

    91f4325ad6241ce75393009712fa2615c8aa2a6a7bdee83d4e7c7f3ad0b750af

  • SHA512

    34fd6e8cb661b1a159f6dbfcb2ab6dca5097366cc837b5dec4a39245e0203be2a531196a6411f58fbdc91ec2a8ba951afef45f95f74b7eabc00c2f556aa65898

  • SSDEEP

    98304:8hEtdFByLU1amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RQOnAKyrUiyE:8gFELdeN/FJMIDJf0gsAGK4RbnAKy4hE

Malware Config

Targets

    • Target

      paywallBypassorNew.exe

    • Size

      6.0MB

    • MD5

      5954fdd06f101977e43eabb2430df142

    • SHA1

      b7be981fea90b95bb673ce8726420ae0c60cdbf8

    • SHA256

      91f4325ad6241ce75393009712fa2615c8aa2a6a7bdee83d4e7c7f3ad0b750af

    • SHA512

      34fd6e8cb661b1a159f6dbfcb2ab6dca5097366cc837b5dec4a39245e0203be2a531196a6411f58fbdc91ec2a8ba951afef45f95f74b7eabc00c2f556aa65898

    • SSDEEP

      98304:8hEtdFByLU1amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RQOnAKyrUiyE:8gFELdeN/FJMIDJf0gsAGK4RbnAKy4hE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks