General

  • Target

    john.exe

  • Size

    7.6MB

  • Sample

    241027-nr9ncsvnfs

  • MD5

    f7c1fceebd4edec06ecb1fa396c8f281

  • SHA1

    e6ec3b1cfce8869a43c82629bfc45cdc5ba3d9cc

  • SHA256

    d165f8937479bee6a34d48c937673a6b994374d852ea3e233a65a9719e3c54e5

  • SHA512

    2206fd7db431c974f105842a29d6c2e19d0c5cfc28d05391483618def1c6cb03aee543c0769917ae68f6312ba800bd973e2d9407750b9c1471a314808e9decff

  • SSDEEP

    196608:/pHYZwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jX:XIHziK1piXLGVE4Ue0VJD

Malware Config

Targets

    • Target

      john.exe

    • Size

      7.6MB

    • MD5

      f7c1fceebd4edec06ecb1fa396c8f281

    • SHA1

      e6ec3b1cfce8869a43c82629bfc45cdc5ba3d9cc

    • SHA256

      d165f8937479bee6a34d48c937673a6b994374d852ea3e233a65a9719e3c54e5

    • SHA512

      2206fd7db431c974f105842a29d6c2e19d0c5cfc28d05391483618def1c6cb03aee543c0769917ae68f6312ba800bd973e2d9407750b9c1471a314808e9decff

    • SSDEEP

      196608:/pHYZwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jX:XIHziK1piXLGVE4Ue0VJD

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks