General

  • Target

    Built.exe

  • Size

    8.1MB

  • Sample

    241101-a2v13awqem

  • MD5

    996d8997dcd057bf8606b853777b9959

  • SHA1

    767638a1ffcb28afdc14b3ada0617ada5efd3439

  • SHA256

    a30500b02fdd41b9fed958099bb892d5f540a5289f5a980995d87bd235bf49a2

  • SHA512

    6be29f1ef117a4bf9ca984a5864bab23d321336d54e696f5ec47148b6955a3c53538357eafd50eb76d18ff464c8497542a3729cf0109bce7358dd5ee876c66d5

  • SSDEEP

    196608:oWBcurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sP:pcurEUWjZZ4dDLIeW7zWGPTNCP

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.1MB

    • MD5

      996d8997dcd057bf8606b853777b9959

    • SHA1

      767638a1ffcb28afdc14b3ada0617ada5efd3439

    • SHA256

      a30500b02fdd41b9fed958099bb892d5f540a5289f5a980995d87bd235bf49a2

    • SHA512

      6be29f1ef117a4bf9ca984a5864bab23d321336d54e696f5ec47148b6955a3c53538357eafd50eb76d18ff464c8497542a3729cf0109bce7358dd5ee876c66d5

    • SSDEEP

      196608:oWBcurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sP:pcurEUWjZZ4dDLIeW7zWGPTNCP

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks