General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    241029-p7skfswran

  • MD5

    41cb920d7fa5aed46820086641d53731

  • SHA1

    a373754c02dc269cc380152f8231109c7bdf01a9

  • SHA256

    a42c68fe69b216f425e374613a373a834298e366645b7b0cd1ffab7a7d6cab91

  • SHA512

    879aedcaf0f24883bd9221f257ac39ab7bef8dcd01053034b7a96d9a3f6c2fc51ebf4002bc647f143b7acadb579dd4c270d8850736091334e6b169d0db397713

  • SSDEEP

    98304:W0EtdFBCIFTamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPH4n88fT:WjFIIFWeN/FJMIDJf0gsAGK4RyLPHx87

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      41cb920d7fa5aed46820086641d53731

    • SHA1

      a373754c02dc269cc380152f8231109c7bdf01a9

    • SHA256

      a42c68fe69b216f425e374613a373a834298e366645b7b0cd1ffab7a7d6cab91

    • SHA512

      879aedcaf0f24883bd9221f257ac39ab7bef8dcd01053034b7a96d9a3f6c2fc51ebf4002bc647f143b7acadb579dd4c270d8850736091334e6b169d0db397713

    • SSDEEP

      98304:W0EtdFBCIFTamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPH4n88fT:WjFIIFWeN/FJMIDJf0gsAGK4RyLPHx87

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks