General

  • Target

    loader.exe

  • Size

    7.6MB

  • Sample

    241029-xy7l1sydpk

  • MD5

    0734f6bedc4b869ee82b9d4cccff40b5

  • SHA1

    f85fad7213954af4c1e97fd8ec295edf76882095

  • SHA256

    f126a99a61fbb3ea941e81fce01cd2a2d64080b33789553f94c2c6043f3b470d

  • SHA512

    897794b690ab100abd0116d167e02d70089890b6b3f9091cccdec82e3bb0b1b3a5f7cc3a0ccbf6aff7f86322e09313277f3233e5879350840b0331fa55fc2ba4

  • SSDEEP

    196608:IpHYLwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:0IHziK1piXLGVE4Ue0VJu

Malware Config

Targets

    • Target

      loader.exe

    • Size

      7.6MB

    • MD5

      0734f6bedc4b869ee82b9d4cccff40b5

    • SHA1

      f85fad7213954af4c1e97fd8ec295edf76882095

    • SHA256

      f126a99a61fbb3ea941e81fce01cd2a2d64080b33789553f94c2c6043f3b470d

    • SHA512

      897794b690ab100abd0116d167e02d70089890b6b3f9091cccdec82e3bb0b1b3a5f7cc3a0ccbf6aff7f86322e09313277f3233e5879350840b0331fa55fc2ba4

    • SSDEEP

      196608:IpHYLwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:0IHziK1piXLGVE4Ue0VJu

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks