General

  • Target

    Executor.zip

  • Size

    7.5MB

  • Sample

    241021-xat11s1clf

  • MD5

    76c9d92053b42a5f132af836a5494fa2

  • SHA1

    359ee05973117272bbbc6d8c0d40029d39d87fc9

  • SHA256

    092940948e0de4a2c0b33c3de39f753f8c738ddf9b89381c6809ab62d1d06530

  • SHA512

    de6fa2226a935367e55f2845fb4b97b8220cf7fbe95edb9fd3e77457cc41899114c0bb23ed20932feff60bf888c4d009f2f37a3e117fa021bf4c40534b02d89e

  • SSDEEP

    196608:ZVH0/wdYj1E4UJc2FBiWyXNG7mpDeHhNbvc4vymSyFFYBh8:ZHYoJcGBlyXNG7++L44vOk

Malware Config

Targets

    • Target

      Executor/Executor.exe

    • Size

      7.7MB

    • MD5

      30340768fa640de1f7ccb644f59970a6

    • SHA1

      c5d2420fa241fc984f85eeaaa01987b44c803e43

    • SHA256

      58737eba38b03039542d9e6b5fff03eeb1b53b644986c62e25a57cb56b975389

    • SHA512

      4b37ded75217f7b832c9b649605b5d7f3469e811b4146c5aca5465a4bd2cb57a0d78e8fe771960237ae8713da385aec7c317860d522c6ddd45e0884a4941876c

    • SSDEEP

      196608:smAHYwwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jf:hnIHziK1piXLGVE4Ue0VJD

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks