General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    241027-b55kcasane

  • MD5

    f695695517df58d6f452c58f009cf3c6

  • SHA1

    8e41f53cb3c8549fbe145c05aed8e5b57b6882d0

  • SHA256

    3af6be9849655bae4fdea4de9aea742302cc4ebbd3579ee0139e672cf4b4058c

  • SHA512

    73a37b64ec33902bfb47bf59ed9f8d855915f97a90664f566fd0f7e03ad70087da7f9b1a7b01f2c8ad25164dca18caf387b4b4fab36f71870fb67b9cfb6e0684

  • SSDEEP

    98304:56EtdFBgwnRwamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RAPMND38MCE:5BFZRReN/FJMIDJf0gsAGK4RAkNbCE

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      f695695517df58d6f452c58f009cf3c6

    • SHA1

      8e41f53cb3c8549fbe145c05aed8e5b57b6882d0

    • SHA256

      3af6be9849655bae4fdea4de9aea742302cc4ebbd3579ee0139e672cf4b4058c

    • SHA512

      73a37b64ec33902bfb47bf59ed9f8d855915f97a90664f566fd0f7e03ad70087da7f9b1a7b01f2c8ad25164dca18caf387b4b4fab36f71870fb67b9cfb6e0684

    • SSDEEP

      98304:56EtdFBgwnRwamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RAPMND38MCE:5BFZRReN/FJMIDJf0gsAGK4RAkNbCE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks