General

  • Target

    Built.exe

  • Size

    7.4MB

  • Sample

    241020-wnhz8stfpq

  • MD5

    089a57ec426ca21d19dcce0ac3654f58

  • SHA1

    95a9deee47fcb1a39b36ebc395381b264b366b26

  • SHA256

    e0e763edb855020ec6a3f959d6666fa43b90068aa9e24055607937e0ceeb27f5

  • SHA512

    a5c109a2f31794f8c4d29e3f2afa089af22fe24676bdbd54e3cb4268393cfc25d30826ad625339106baade36d8163ef7323992637594ef4d1042b50e34b56b36

  • SSDEEP

    196608:Y10cDPrLjv+bhqNVoBKUh8mz4Iv9PQv1DVQ:ziPPL+9qz8/b4Imv3Q

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.4MB

    • MD5

      089a57ec426ca21d19dcce0ac3654f58

    • SHA1

      95a9deee47fcb1a39b36ebc395381b264b366b26

    • SHA256

      e0e763edb855020ec6a3f959d6666fa43b90068aa9e24055607937e0ceeb27f5

    • SHA512

      a5c109a2f31794f8c4d29e3f2afa089af22fe24676bdbd54e3cb4268393cfc25d30826ad625339106baade36d8163ef7323992637594ef4d1042b50e34b56b36

    • SSDEEP

      196608:Y10cDPrLjv+bhqNVoBKUh8mz4Iv9PQv1DVQ:ziPPL+9qz8/b4Imv3Q

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks