General

  • Target

    SecuriteInfo.com.Python.Packed.59.10217.7860.exe

  • Size

    7.5MB

  • Sample

    241027-v7qzhszfjh

  • MD5

    d4d15e51aea05960af4374af1bbf2a07

  • SHA1

    a6f375da23aa2968133bfb68fd8f1e151fe66c2d

  • SHA256

    d93a64436ad81748dfeebca8d1e2396843c80d01222367e244794ce6a4188bff

  • SHA512

    509e2cac45f1959a17bdc50c838b825c1568f0165ed1d89fd9d46c60ddfee06d9b85736485f14687e6d1518be3b0360126375e1fd4cec7c520fea4a7c95d8a93

  • SSDEEP

    196608:PCgFzwfI9jUC2gYBYv3vbW5+iITm1U6fj:zFAIH2gYBgDW4TOzL

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Packed.59.10217.7860.exe

    • Size

      7.5MB

    • MD5

      d4d15e51aea05960af4374af1bbf2a07

    • SHA1

      a6f375da23aa2968133bfb68fd8f1e151fe66c2d

    • SHA256

      d93a64436ad81748dfeebca8d1e2396843c80d01222367e244794ce6a4188bff

    • SHA512

      509e2cac45f1959a17bdc50c838b825c1568f0165ed1d89fd9d46c60ddfee06d9b85736485f14687e6d1518be3b0360126375e1fd4cec7c520fea4a7c95d8a93

    • SSDEEP

      196608:PCgFzwfI9jUC2gYBYv3vbW5+iITm1U6fj:zFAIH2gYBgDW4TOzL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks