General

  • Target

    SecuriteInfo.com.Python.Muldrop.16.26792.13248.exe

  • Size

    7.7MB

  • Sample

    241027-w8n2zsyjan

  • MD5

    e61c1c075750c715689f33a65ca63ba6

  • SHA1

    3e5b19ed2979ec1596a877a85f6c9e532c6839a8

  • SHA256

    3b72607214d2454a3fe277595c2b91070020037f1ffb2a2c69e2583da4da0bc7

  • SHA512

    e02bbaed5d269a6782ea7c283536f8b4fdd60c5483e1cf187508c1e6d43619c4a31decbf143de14f3b0f3f2e547f72197fdc81dc34eaf9fa46d69174c6f00a21

  • SSDEEP

    196608:WZ0eDeNTfm/pf+xk4dNSESRpmrbW3jmry:Vy/pWu4m5Rpmrbmyry

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Muldrop.16.26792.13248.exe

    • Size

      7.7MB

    • MD5

      e61c1c075750c715689f33a65ca63ba6

    • SHA1

      3e5b19ed2979ec1596a877a85f6c9e532c6839a8

    • SHA256

      3b72607214d2454a3fe277595c2b91070020037f1ffb2a2c69e2583da4da0bc7

    • SHA512

      e02bbaed5d269a6782ea7c283536f8b4fdd60c5483e1cf187508c1e6d43619c4a31decbf143de14f3b0f3f2e547f72197fdc81dc34eaf9fa46d69174c6f00a21

    • SSDEEP

      196608:WZ0eDeNTfm/pf+xk4dNSESRpmrbW3jmry:Vy/pWu4m5Rpmrbmyry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks