General

  • Target

    Universal Aim Lock(Beta).exe

  • Size

    7.4MB

  • Sample

    241027-zm7hzsscma

  • MD5

    85b6d73aedf9a487c7ebc72f2deb219e

  • SHA1

    28c34d30d1626bd282cf7cc0cb177b4db2fdc545

  • SHA256

    be32661052eb4dec9ffcd000552c142a30a7dfd714f4372ee0b72b42141bd4d5

  • SHA512

    aa09b30b983a9eecac86925366e67f37405f26f69f6ddd66fcbf2c648317e6243257cbbbd69088b08a23e4cc4b85db65929781dfbcc0bd3d5d5e8d2d5921239f

  • SSDEEP

    98304:pVSi8x9XQso2UurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC1p:pkP9VozurErvI9pWjgfPvzm6gsFE14Ap

Malware Config

Targets

    • Target

      Universal Aim Lock(Beta).exe

    • Size

      7.4MB

    • MD5

      85b6d73aedf9a487c7ebc72f2deb219e

    • SHA1

      28c34d30d1626bd282cf7cc0cb177b4db2fdc545

    • SHA256

      be32661052eb4dec9ffcd000552c142a30a7dfd714f4372ee0b72b42141bd4d5

    • SHA512

      aa09b30b983a9eecac86925366e67f37405f26f69f6ddd66fcbf2c648317e6243257cbbbd69088b08a23e4cc4b85db65929781dfbcc0bd3d5d5e8d2d5921239f

    • SSDEEP

      98304:pVSi8x9XQso2UurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC1p:pkP9VozurErvI9pWjgfPvzm6gsFE14Ap

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks