General

  • Target

    k3spatch(RUNFIRST).exe

  • Size

    7.7MB

  • Sample

    241021-3zsr5stgnb

  • MD5

    f7eff2fc4e934bffbf56d6be4b650182

  • SHA1

    d6da9ae4b19e9ed4f46deff2c0fabd3234db1c1c

  • SHA256

    0936177bc574fab7afde2327bfb0c7ca746d26098aa68b5f28eea1e930efb4d0

  • SHA512

    bc1ddd7f5840a0de32789ff62d169ddbd54af50d93896b7c5c5b97e2f848b5f80e51a8614f783be58f23aaa5ce88b9bac17a69601087b741152401b7c6affaeb

  • SSDEEP

    196608:Ux0YC+GeNTfm/pf+xk4dfrl7RptrbWOjgr3:SBy/pWu4NpRptrbvMr3

Malware Config

Targets

    • Target

      k3spatch(RUNFIRST).exe

    • Size

      7.7MB

    • MD5

      f7eff2fc4e934bffbf56d6be4b650182

    • SHA1

      d6da9ae4b19e9ed4f46deff2c0fabd3234db1c1c

    • SHA256

      0936177bc574fab7afde2327bfb0c7ca746d26098aa68b5f28eea1e930efb4d0

    • SHA512

      bc1ddd7f5840a0de32789ff62d169ddbd54af50d93896b7c5c5b97e2f848b5f80e51a8614f783be58f23aaa5ce88b9bac17a69601087b741152401b7c6affaeb

    • SSDEEP

      196608:Ux0YC+GeNTfm/pf+xk4dfrl7RptrbWOjgr3:SBy/pWu4NpRptrbvMr3

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks