General

  • Target

    Built.exe

  • Size

    8.3MB

  • Sample

    241029-lygj2svaje

  • MD5

    f9b03a4ca76d7c8e9fae48e25d6a3d95

  • SHA1

    d5c97083c2de49a4ac7f92b9c4804a9a3d43a1dd

  • SHA256

    bbdef141c4d03195652efad92dea9456f6da831b15c282f8b97a2f5ccdfe9a9e

  • SHA512

    b3ecf24ba5e7f8862a98acd2efee33be603d8ab851917244f9c41ae09c18f16a911e4fb583f1dc7982eb3a84ff986bb3aeffa0e9d68e1c05b8266a0d7ac51194

  • SSDEEP

    196608:uk6jurErvI9pWjg/Qc+4o673pNrabebSEjxyMDH8mo:cjurEUWjZZ4dDLIeWCym8l

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.3MB

    • MD5

      f9b03a4ca76d7c8e9fae48e25d6a3d95

    • SHA1

      d5c97083c2de49a4ac7f92b9c4804a9a3d43a1dd

    • SHA256

      bbdef141c4d03195652efad92dea9456f6da831b15c282f8b97a2f5ccdfe9a9e

    • SHA512

      b3ecf24ba5e7f8862a98acd2efee33be603d8ab851917244f9c41ae09c18f16a911e4fb583f1dc7982eb3a84ff986bb3aeffa0e9d68e1c05b8266a0d7ac51194

    • SSDEEP

      196608:uk6jurErvI9pWjg/Qc+4o673pNrabebSEjxyMDH8mo:cjurEUWjZZ4dDLIeWCym8l

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks