General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    241028-rx4k3s1hpk

  • MD5

    a5966352e62a4bff28b0fabab0167921

  • SHA1

    b5dc66c54b8ffaab38100b9b3d7355c18204a3ea

  • SHA256

    83f895927852f8c1129b05d6a11bce2b7bd9c1a1b55f548792fb99ac26972ef5

  • SHA512

    87e7206b3a9fbb1858ad62d854fd4a23c3aead0982f4a9f6da15816bf8b54720bb36e9d69490b332dbb2fe9aea8c2730fd4207cd55de6ba93ec375fcd8b555c1

  • SSDEEP

    196608:kZFjtxeN/FJMIDJf0gsAGK4RPkqBrTIno://Fqyf0gstPkOnIo

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      a5966352e62a4bff28b0fabab0167921

    • SHA1

      b5dc66c54b8ffaab38100b9b3d7355c18204a3ea

    • SHA256

      83f895927852f8c1129b05d6a11bce2b7bd9c1a1b55f548792fb99ac26972ef5

    • SHA512

      87e7206b3a9fbb1858ad62d854fd4a23c3aead0982f4a9f6da15816bf8b54720bb36e9d69490b332dbb2fe9aea8c2730fd4207cd55de6ba93ec375fcd8b555c1

    • SSDEEP

      196608:kZFjtxeN/FJMIDJf0gsAGK4RPkqBrTIno://Fqyf0gstPkOnIo

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks