General

  • Target

    Perm.exe

  • Size

    6.9MB

  • Sample

    241029-xsa1vsxkcv

  • MD5

    e8592a7609f5895d3a5237b31951a7fb

  • SHA1

    05b9cb9ac8f7dcd84fd17ad63c0db3c913a8bac3

  • SHA256

    a1e165909e125f9e8e2266304d012f6d23e6d09953917c00b72cd7cd1279919c

  • SHA512

    0a1c7ed6c3c1f4e5871a9f7a407798b953bd219090681a248737e7a174b8c4643a7dc71039d012f01664a0c591a109d9bd308887f1f1d4cd21144e5d399c7279

  • SSDEEP

    98304:vVp9DjWM8JEE1FCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIL:r90ReNTfm/pf+xk4dWRpmrbW3jmrJ

Malware Config

Targets

    • Target

      Perm.exe

    • Size

      6.9MB

    • MD5

      e8592a7609f5895d3a5237b31951a7fb

    • SHA1

      05b9cb9ac8f7dcd84fd17ad63c0db3c913a8bac3

    • SHA256

      a1e165909e125f9e8e2266304d012f6d23e6d09953917c00b72cd7cd1279919c

    • SHA512

      0a1c7ed6c3c1f4e5871a9f7a407798b953bd219090681a248737e7a174b8c4643a7dc71039d012f01664a0c591a109d9bd308887f1f1d4cd21144e5d399c7279

    • SSDEEP

      98304:vVp9DjWM8JEE1FCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIL:r90ReNTfm/pf+xk4dWRpmrbW3jmrJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks