Resubmissions

29-10-2024 01:53

241029-cbcsxazngy 10

29-10-2024 01:52

241029-caq9xasclf 10

29-10-2024 01:51

241029-b9xqaszncn 10

29-10-2024 01:48

241029-b8j3taznbv 10

29-10-2024 01:43

241029-b48klszmen 10

General

  • Target

    Vanish (3).exe

  • Size

    9.5MB

  • Sample

    241029-cbcsxazngy

  • MD5

    c0a0a8dc4be717b74303ac71b31b2e96

  • SHA1

    3f8392ba34324f254099ec8ad2d79360594b650a

  • SHA256

    4aa7e625c9587fc1170d0203e36285e0fffdbbe945032dc3bc7116063ad30d9a

  • SHA512

    41cb3fbbce4b6ade8093ec807a597709cbf88241f2fcae86fea8f2ab71deb93a0a2c96059a67d46af2febbb4080a810e18cfa84508b4e060885b1d7b87fb2e10

  • SSDEEP

    196608:/pgaywNRQlgwfI9jUC2gYBYv3vbW4SEB+itP3D2X371C:yaybl/IH2gYBgDWZ4vDE3pC

Malware Config

Targets

    • Target

      Vanish (3).exe

    • Size

      9.5MB

    • MD5

      c0a0a8dc4be717b74303ac71b31b2e96

    • SHA1

      3f8392ba34324f254099ec8ad2d79360594b650a

    • SHA256

      4aa7e625c9587fc1170d0203e36285e0fffdbbe945032dc3bc7116063ad30d9a

    • SHA512

      41cb3fbbce4b6ade8093ec807a597709cbf88241f2fcae86fea8f2ab71deb93a0a2c96059a67d46af2febbb4080a810e18cfa84508b4e060885b1d7b87fb2e10

    • SSDEEP

      196608:/pgaywNRQlgwfI9jUC2gYBYv3vbW4SEB+itP3D2X371C:yaybl/IH2gYBgDWZ4vDE3pC

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks