General

  • Target

    d4d15e51aea05960af4374af1bbf2a07.bin

  • Size

    7.4MB

  • Sample

    241029-b6t51azmht

  • MD5

    2d23f1726c23148917e3dee1a4063f75

  • SHA1

    96ef0f06edcc8b4fdc596b81391ea391acddb2f6

  • SHA256

    8a10054a49ac0f4fe83eb022b8df78a9a62ca6efa7cc124f0bb6600e2072ec7e

  • SHA512

    28abcd0202b786d474044d72d73d95c0746065336130caf6b6b9199ce0d6d2aec0555daab5be60329d93177b43578f2938a407c62e4687e978b2da1ea7d8c79e

  • SSDEEP

    196608:n9Vd3xV5b/bamqMTtA1vw833pCs5uFF3t+rWNz/4z+P4XsnL7p:ntxV1/baoKtw2pCfF3tpNz/4za4cL7p

Malware Config

Targets

    • Target

      d93a64436ad81748dfeebca8d1e2396843c80d01222367e244794ce6a4188bff.exe

    • Size

      7.5MB

    • MD5

      d4d15e51aea05960af4374af1bbf2a07

    • SHA1

      a6f375da23aa2968133bfb68fd8f1e151fe66c2d

    • SHA256

      d93a64436ad81748dfeebca8d1e2396843c80d01222367e244794ce6a4188bff

    • SHA512

      509e2cac45f1959a17bdc50c838b825c1568f0165ed1d89fd9d46c60ddfee06d9b85736485f14687e6d1518be3b0360126375e1fd4cec7c520fea4a7c95d8a93

    • SSDEEP

      196608:PCgFzwfI9jUC2gYBYv3vbW5+iITm1U6fj:zFAIH2gYBgDW4TOzL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks