Resubmissions

30-10-2024 12:02

241030-n7xcza1qds 10

30-10-2024 11:49

241030-nze4qatqcj 10

General

  • Target

    Built.exe

  • Size

    8.4MB

  • Sample

    241030-n7xcza1qds

  • MD5

    9c4eb24cc74d956151ffa2d24de4c76e

  • SHA1

    7e9b576192de2d0ec9189014a7933ddd4d012462

  • SHA256

    7ab77c2adcb3c6689685420a32a3505a19b6542cc6c73e8d7b30781e96868c45

  • SHA512

    092768bf0743a4b4d2af9aee184cd668279c6fcb3138abffcadad36554230e0456ce13158daa6d9fd2fac72fa16bd2d32cb59ae620a6d4f70594c82113295f3a

  • SSDEEP

    196608:FJuCoYawfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jJ:WAIHziK1piXLGVE4UqC0VJd

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.4MB

    • MD5

      9c4eb24cc74d956151ffa2d24de4c76e

    • SHA1

      7e9b576192de2d0ec9189014a7933ddd4d012462

    • SHA256

      7ab77c2adcb3c6689685420a32a3505a19b6542cc6c73e8d7b30781e96868c45

    • SHA512

      092768bf0743a4b4d2af9aee184cd668279c6fcb3138abffcadad36554230e0456ce13158daa6d9fd2fac72fa16bd2d32cb59ae620a6d4f70594c82113295f3a

    • SSDEEP

      196608:FJuCoYawfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jJ:WAIHziK1piXLGVE4UqC0VJd

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks