General

  • Target

    plasmadiwness.exe

  • Size

    8.4MB

  • Sample

    241030-z7kjysspgj

  • MD5

    0d3cd19db4ec192aaf4b7a8bcdf3af16

  • SHA1

    ba27b65ae0a87dc4478585560a579d3bd2e5b47e

  • SHA256

    4dc68228313866d8c5b838282eb100909ab546cf742f0420c5d955830eca4c5d

  • SHA512

    5571ebd88f45440acfedbd9a3dab8473881556346c78ee04b741a29ed75a74406de3c88b8767db9d107aa67c9fd5ee51f0a95f9597f6d0dbb447e33982a54076

  • SSDEEP

    196608:t/yY/YCwfI9jUCzi4H1qSiXLGVi7DMgpZ7vQ0VMwICEc/j:09IHziK1piXLGVE4UhY0VJ

Malware Config

Targets

    • Target

      plasmadiwness.exe

    • Size

      8.4MB

    • MD5

      0d3cd19db4ec192aaf4b7a8bcdf3af16

    • SHA1

      ba27b65ae0a87dc4478585560a579d3bd2e5b47e

    • SHA256

      4dc68228313866d8c5b838282eb100909ab546cf742f0420c5d955830eca4c5d

    • SHA512

      5571ebd88f45440acfedbd9a3dab8473881556346c78ee04b741a29ed75a74406de3c88b8767db9d107aa67c9fd5ee51f0a95f9597f6d0dbb447e33982a54076

    • SSDEEP

      196608:t/yY/YCwfI9jUCzi4H1qSiXLGVi7DMgpZ7vQ0VMwICEc/j:09IHziK1piXLGVE4UhY0VJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks