General

  • Target

    $R2SL635.exe

  • Size

    7.5MB

  • Sample

    241029-mkyf3svrhp

  • MD5

    f7dbd6f4631eda20d33ac81347609b04

  • SHA1

    253852eacadf66d5907e789cd0378ca9b30c0025

  • SHA256

    e9fa9576000941de5affa155585ef9afe9373700ae7e3d36cc2491ff3fd9b81b

  • SHA512

    67b29b20b3a32780209dec7b7bca602e53c7a78f071402466977c5fbf8d5ba692db396d9b1be4c30e918de8b305e50015f092eaad9a360f963a432b3458056f4

  • SSDEEP

    196608:iSmDaeNHXOvJTSRHvUWvozWOxu9kXwvdbDlA03NIhnWDUMihUi:dGZdOMRHdKbAlbZA036hWDoV

Malware Config

Targets

    • Target

      $R2SL635.exe

    • Size

      7.5MB

    • MD5

      f7dbd6f4631eda20d33ac81347609b04

    • SHA1

      253852eacadf66d5907e789cd0378ca9b30c0025

    • SHA256

      e9fa9576000941de5affa155585ef9afe9373700ae7e3d36cc2491ff3fd9b81b

    • SHA512

      67b29b20b3a32780209dec7b7bca602e53c7a78f071402466977c5fbf8d5ba692db396d9b1be4c30e918de8b305e50015f092eaad9a360f963a432b3458056f4

    • SSDEEP

      196608:iSmDaeNHXOvJTSRHvUWvozWOxu9kXwvdbDlA03NIhnWDUMihUi:dGZdOMRHdKbAlbZA036hWDoV

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks