General

  • Target

    ZaraSpooferV2.exe

  • Size

    16.6MB

  • Sample

    241030-w28stazqep

  • MD5

    41bd279b6a44ca705bb00edf5eda75f9

  • SHA1

    960920de92c92ef23f29210c9d74ec35dc651f1e

  • SHA256

    bd72e950f325bea2b5aa816e0b031da503f63981a253f7c2462525b072bae357

  • SHA512

    91e0e63eaf0915f38de46f1be8b71b8313b199544c00f38a321c5faa019c6361bd401fc1a04dd0b3bb835a9a4400deae3bd96bc9493228b987bc7c1295dacb95

  • SSDEEP

    393216:+6JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstUAKQ:+gZYoWw4jHrIegvQ0wNONV4vtp

Malware Config

Targets

    • Target

      ZaraSpooferV2.exe

    • Size

      16.6MB

    • MD5

      41bd279b6a44ca705bb00edf5eda75f9

    • SHA1

      960920de92c92ef23f29210c9d74ec35dc651f1e

    • SHA256

      bd72e950f325bea2b5aa816e0b031da503f63981a253f7c2462525b072bae357

    • SHA512

      91e0e63eaf0915f38de46f1be8b71b8313b199544c00f38a321c5faa019c6361bd401fc1a04dd0b3bb835a9a4400deae3bd96bc9493228b987bc7c1295dacb95

    • SSDEEP

      393216:+6JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstUAKQ:+gZYoWw4jHrIegvQ0wNONV4vtp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks