General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241029-x584esyelp

  • MD5

    b9405c545f9323936964dfa99042a27d

  • SHA1

    cfa84d72adeb0db5523af01c5aeca29453bcdcff

  • SHA256

    2f94193c9e7bda8006aef1169873d4a512e6fe43de1a08a4a0781e47a87ac8eb

  • SHA512

    53399aee23975c6d358075a225e044257a3bb68e070cd664e7c9dbc6f77e94476cfcef9298ba6ea030ad571a59e256c79177aaabbaabcc827000153cf2e49b7b

  • SSDEEP

    98304:zfDjWM8JEE1FpamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFW+:zf0WeNTfm/pf+xk4dWRpmrbW3jmr

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      b9405c545f9323936964dfa99042a27d

    • SHA1

      cfa84d72adeb0db5523af01c5aeca29453bcdcff

    • SHA256

      2f94193c9e7bda8006aef1169873d4a512e6fe43de1a08a4a0781e47a87ac8eb

    • SHA512

      53399aee23975c6d358075a225e044257a3bb68e070cd664e7c9dbc6f77e94476cfcef9298ba6ea030ad571a59e256c79177aaabbaabcc827000153cf2e49b7b

    • SSDEEP

      98304:zfDjWM8JEE1FpamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFW+:zf0WeNTfm/pf+xk4dWRpmrbW3jmr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks