General

  • Target

    TD.premiumbeta.exe

  • Size

    7.4MB

  • Sample

    241029-nw5j7stngz

  • MD5

    92be1111700fb7aa292c3802ad821847

  • SHA1

    f0972a23e67ccdf7d3f107f199a881af177e69b2

  • SHA256

    82d90e090e6f565dd9f98771b6b264bb6cd16787615636767dd07e50b5194a31

  • SHA512

    f50d581c83c46869e6d0bf585f0e8a8348d84e95ba778bcf8dbae4d6dca06324367dbeab5b2fac3124b5a3a13d93d6fd872ccbdc79e8af3b5525f5ef6c704964

  • SSDEEP

    98304:+Vp5IMc3urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMs:8QurErvI9pWjgyvoaYrE41JIuIzoO9

Malware Config

Targets

    • Target

      TD.premiumbeta.exe

    • Size

      7.4MB

    • MD5

      92be1111700fb7aa292c3802ad821847

    • SHA1

      f0972a23e67ccdf7d3f107f199a881af177e69b2

    • SHA256

      82d90e090e6f565dd9f98771b6b264bb6cd16787615636767dd07e50b5194a31

    • SHA512

      f50d581c83c46869e6d0bf585f0e8a8348d84e95ba778bcf8dbae4d6dca06324367dbeab5b2fac3124b5a3a13d93d6fd872ccbdc79e8af3b5525f5ef6c704964

    • SSDEEP

      98304:+Vp5IMc3urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMs:8QurErvI9pWjgyvoaYrE41JIuIzoO9

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks