General

  • Target

    860ad500a1741197344e719e2f570aac8811473ec3ce44ad66b874e42b2e2bed.exe

  • Size

    25.0MB

  • Sample

    241101-ezch6axbpk

  • MD5

    a5af3f0e1e261345c9cebbb10b543185

  • SHA1

    2a8a9245c52fba021471ba3cf5a404a0e64f7db7

  • SHA256

    860ad500a1741197344e719e2f570aac8811473ec3ce44ad66b874e42b2e2bed

  • SHA512

    3f4b5d4c83ddbffcd6f5e28cebc8eb8e79032e867d823a9e52f3b2739db72816865ccbb52bc50d5dbeb1df27eeb6a5c5521f31fa8ad823019734155cbea46448

  • SSDEEP

    196608:STgeIODwfI9jUC2gYBYv3vbWvGPI63p1e5z2:PMwIH2gYBgDWgpwV2

Malware Config

Targets

    • Target

      860ad500a1741197344e719e2f570aac8811473ec3ce44ad66b874e42b2e2bed.exe

    • Size

      25.0MB

    • MD5

      a5af3f0e1e261345c9cebbb10b543185

    • SHA1

      2a8a9245c52fba021471ba3cf5a404a0e64f7db7

    • SHA256

      860ad500a1741197344e719e2f570aac8811473ec3ce44ad66b874e42b2e2bed

    • SHA512

      3f4b5d4c83ddbffcd6f5e28cebc8eb8e79032e867d823a9e52f3b2739db72816865ccbb52bc50d5dbeb1df27eeb6a5c5521f31fa8ad823019734155cbea46448

    • SSDEEP

      196608:STgeIODwfI9jUC2gYBYv3vbWvGPI63p1e5z2:PMwIH2gYBgDWgpwV2

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks