General

  • Target

    Built.exe

  • Size

    80.0MB

  • Sample

    241020-serdgathpe

  • MD5

    86019ea1bbf0974b163d3613ab134c5f

  • SHA1

    4ff3635a97354f9030e1a0818d280631abcbb0f6

  • SHA256

    1fd44f7ab8243791f3dbfbedd33fa9d27c02f32fe82c54b49612594ebb9c9d49

  • SHA512

    677e33859cf0a02e86879b247fb773d8c61f170b44ba72f8932be2fd44465bb6889b93920f39797ad9a3ea675cdb8401f1a512db66990ec1ea0c0df922958551

  • SSDEEP

    196608:zHHY4JnwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/ji:lsIHziK1piXLGVE4Ue0VJm

Malware Config

Targets

    • Target

      Built.exe

    • Size

      80.0MB

    • MD5

      86019ea1bbf0974b163d3613ab134c5f

    • SHA1

      4ff3635a97354f9030e1a0818d280631abcbb0f6

    • SHA256

      1fd44f7ab8243791f3dbfbedd33fa9d27c02f32fe82c54b49612594ebb9c9d49

    • SHA512

      677e33859cf0a02e86879b247fb773d8c61f170b44ba72f8932be2fd44465bb6889b93920f39797ad9a3ea675cdb8401f1a512db66990ec1ea0c0df922958551

    • SSDEEP

      196608:zHHY4JnwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/ji:lsIHziK1piXLGVE4Ue0VJm

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks