General

  • Target

    939e33f16f81462a0038e4af52755ae949ddf377c13d4e343ffa0954c28dc917

  • Size

    6.9MB

  • Sample

    241031-w7g72sscnh

  • MD5

    5b80ba8055ce6192a7455a80c4841ca9

  • SHA1

    1bedde3c06cb9476f4e4f43cf54faf66b5f83000

  • SHA256

    939e33f16f81462a0038e4af52755ae949ddf377c13d4e343ffa0954c28dc917

  • SHA512

    393d0992efc114215f62609c27b5c930512f97f2db2afcb7b4419b890df03a7653acc35832c02c67197beb9551f1570adeb1b671e5759236d2040176e255ac03

  • SSDEEP

    98304:S/zHqdVfB2FS27w3RyuT/9vUIdD9C+z3zO917vOTh+ezDNh7bvmJ1nmOBN9n4m4J:STQsqRbT/9bvLz3S1bA3zin972

Malware Config

Targets

    • Target

      939e33f16f81462a0038e4af52755ae949ddf377c13d4e343ffa0954c28dc917

    • Size

      6.9MB

    • MD5

      5b80ba8055ce6192a7455a80c4841ca9

    • SHA1

      1bedde3c06cb9476f4e4f43cf54faf66b5f83000

    • SHA256

      939e33f16f81462a0038e4af52755ae949ddf377c13d4e343ffa0954c28dc917

    • SHA512

      393d0992efc114215f62609c27b5c930512f97f2db2afcb7b4419b890df03a7653acc35832c02c67197beb9551f1570adeb1b671e5759236d2040176e255ac03

    • SSDEEP

      98304:S/zHqdVfB2FS27w3RyuT/9vUIdD9C+z3zO917vOTh+ezDNh7bvmJ1nmOBN9n4m4J:STQsqRbT/9bvLz3S1bA3zin972

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks