General

  • Target

    FN.PRIV.exe

  • Size

    7.4MB

  • Sample

    241023-sw3g3azamk

  • MD5

    c947e8c44f6f7f4e81f13e4ee7ce0e38

  • SHA1

    f3bc6d5760f07caf6e50a19d866ecb3af0a9abe4

  • SHA256

    c73750dac1a808fcd97235eb7f63a5ff7b2bc4ec0d3194392ab05f3f2a93cd81

  • SHA512

    dcd3111af723df57f87b225094da7c1316c14f12daeb8b10565858afb912f4c23438cbfaae149801eb520554d81fbc4921bffacd812835015dcf217728c716ad

  • SSDEEP

    196608:ko8P8Ljv+bhqNVoB0SEsucQZ41JBbIEs1Lr:f8PsL+9qz80SJHQK1J9shr

Malware Config

Targets

    • Target

      FN.PRIV.exe

    • Size

      7.4MB

    • MD5

      c947e8c44f6f7f4e81f13e4ee7ce0e38

    • SHA1

      f3bc6d5760f07caf6e50a19d866ecb3af0a9abe4

    • SHA256

      c73750dac1a808fcd97235eb7f63a5ff7b2bc4ec0d3194392ab05f3f2a93cd81

    • SHA512

      dcd3111af723df57f87b225094da7c1316c14f12daeb8b10565858afb912f4c23438cbfaae149801eb520554d81fbc4921bffacd812835015dcf217728c716ad

    • SSDEEP

      196608:ko8P8Ljv+bhqNVoB0SEsucQZ41JBbIEs1Lr:f8PsL+9qz80SJHQK1J9shr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks