General

  • Target

    Celex v3 Leaked.exe

  • Size

    7.5MB

  • Sample

    241101-1v1abaweqr

  • MD5

    b5385c1712c82a7912d7bbfaba9835d0

  • SHA1

    2e0a4471677ca95ecfcc16bea5e137eb1d95ab92

  • SHA256

    02f80434479beaaff01f768864a0d2f005af23d57b297910f1a1833e599db01f

  • SHA512

    0066cfa9773675be68bec24d4444ad11fbf14765cc521f216ca4062c8fdf7181daed9f04bd5dc69b1ad4e7ec1f9296b1ee29b4f0499e6fe849eca8737e6d6a7d

  • SSDEEP

    196608:i8gVVE4PwfI9jUC2gYBYv3vbW2+iITx1U6n7:WVVEFIH2gYBgDWJTnz7

Malware Config

Targets

    • Target

      Celex v3 Leaked.exe

    • Size

      7.5MB

    • MD5

      b5385c1712c82a7912d7bbfaba9835d0

    • SHA1

      2e0a4471677ca95ecfcc16bea5e137eb1d95ab92

    • SHA256

      02f80434479beaaff01f768864a0d2f005af23d57b297910f1a1833e599db01f

    • SHA512

      0066cfa9773675be68bec24d4444ad11fbf14765cc521f216ca4062c8fdf7181daed9f04bd5dc69b1ad4e7ec1f9296b1ee29b4f0499e6fe849eca8737e6d6a7d

    • SSDEEP

      196608:i8gVVE4PwfI9jUC2gYBYv3vbW2+iITx1U6n7:WVVEFIH2gYBgDWJTnz7

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks