General

  • Target

    e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7.exe

  • Size

    6.0MB

  • Sample

    241101-gskx3ayall

  • MD5

    e520eedb426f94a03b27bc439a428a12

  • SHA1

    6ea6027ec15ca1c2ca8723b40abe8abf5934b677

  • SHA256

    e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7

  • SHA512

    e05220bbe5938e6ee4c16e8619d7d9578a69ac549f8152e2d2d96c6a86d790b0a7d831130a71f10e01e03109cb867dd37c8df8fd8c9dca0937ab837b5a03e43d

  • SSDEEP

    98304:wJEtdFBB7MamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RYPMGr3mMGg:wIFj7teN/FJMIDJf0gsAGK4RYkGJGg

Malware Config

Targets

    • Target

      e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7.exe

    • Size

      6.0MB

    • MD5

      e520eedb426f94a03b27bc439a428a12

    • SHA1

      6ea6027ec15ca1c2ca8723b40abe8abf5934b677

    • SHA256

      e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7

    • SHA512

      e05220bbe5938e6ee4c16e8619d7d9578a69ac549f8152e2d2d96c6a86d790b0a7d831130a71f10e01e03109cb867dd37c8df8fd8c9dca0937ab837b5a03e43d

    • SSDEEP

      98304:wJEtdFBB7MamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RYPMGr3mMGg:wIFj7teN/FJMIDJf0gsAGK4RYkGJGg

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks