Resubmissions

30-10-2024 12:02

241030-n7xcza1qds 10

30-10-2024 11:49

241030-nze4qatqcj 10

General

  • Target

    Built.exe

  • Size

    8.4MB

  • Sample

    241030-nze4qatqcj

  • MD5

    9c4eb24cc74d956151ffa2d24de4c76e

  • SHA1

    7e9b576192de2d0ec9189014a7933ddd4d012462

  • SHA256

    7ab77c2adcb3c6689685420a32a3505a19b6542cc6c73e8d7b30781e96868c45

  • SHA512

    092768bf0743a4b4d2af9aee184cd668279c6fcb3138abffcadad36554230e0456ce13158daa6d9fd2fac72fa16bd2d32cb59ae620a6d4f70594c82113295f3a

  • SSDEEP

    196608:FJuCoYawfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jJ:WAIHziK1piXLGVE4UqC0VJd

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.4MB

    • MD5

      9c4eb24cc74d956151ffa2d24de4c76e

    • SHA1

      7e9b576192de2d0ec9189014a7933ddd4d012462

    • SHA256

      7ab77c2adcb3c6689685420a32a3505a19b6542cc6c73e8d7b30781e96868c45

    • SHA512

      092768bf0743a4b4d2af9aee184cd668279c6fcb3138abffcadad36554230e0456ce13158daa6d9fd2fac72fa16bd2d32cb59ae620a6d4f70594c82113295f3a

    • SSDEEP

      196608:FJuCoYawfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jJ:WAIHziK1piXLGVE4UqC0VJd

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �*��f��.pyc

    • Size

      1KB

    • MD5

      43bc73ca0b40053e8c3707202190f4e0

    • SHA1

      5f3ce082d76866ce30b19857fc7f085d34f1694f

    • SHA256

      52ac56a989f9b62d028a7c53c45c516f1727446f693dacc9cf842ace518098c2

    • SHA512

      d2fd4f5f30bdcfcb8ad20143d878418f820e8ff7df1f6a299d480c9f4e882d24f250253074f8442e9dfb0d4b88bbbc8e551be00c3545dc7bbec1ec2e09a237c9

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks