General

  • Target

    DEVOUR.exe

  • Size

    10.0MB

  • Sample

    241027-mc639avket

  • MD5

    ca811f74e36bddc62d665b801f4486a6

  • SHA1

    4982cfffac5cbb7d627cd4d23dc1a5f4dea240eb

  • SHA256

    b8cc06250372ccac1c9d1dbfe734c157ee2608ab2cf4a5660379981b0094ef0d

  • SHA512

    9bde797426a333262851959c429d58d6fb99a202178e2f009d2757c30477d6eb3b9757837ef51046ba8a336a63d19b34bdf7957b2283c886ea8528129f721d45

  • SSDEEP

    196608:k3HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:xIHziK1piXLGVE4Ue0VJY

Malware Config

Targets

    • Target

      DEVOUR.exe

    • Size

      10.0MB

    • MD5

      ca811f74e36bddc62d665b801f4486a6

    • SHA1

      4982cfffac5cbb7d627cd4d23dc1a5f4dea240eb

    • SHA256

      b8cc06250372ccac1c9d1dbfe734c157ee2608ab2cf4a5660379981b0094ef0d

    • SHA512

      9bde797426a333262851959c429d58d6fb99a202178e2f009d2757c30477d6eb3b9757837ef51046ba8a336a63d19b34bdf7957b2283c886ea8528129f721d45

    • SSDEEP

      196608:k3HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:xIHziK1piXLGVE4Ue0VJY

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks