General

  • Target

    Built.exe

  • Size

    8.4MB

  • Sample

    241101-lct81szcmp

  • MD5

    c4fcff04ad51c7d31d9123b6f77eb5fc

  • SHA1

    02f7da11a0584442ef742dedd4071ee093f50954

  • SHA256

    7363441ed703a9b7f4697402e0a88eb7f515bd40c739dc8fafeef3285b6ea92b

  • SHA512

    edbf57cb41b9e04cafcbf02d01b47d094916c6ad5e1d7409983b5ccb6f25b02c32f6d314d2a6260db119b525db3b9179d0c34b04bd775e5077150fe9bab46408

  • SSDEEP

    196608:yUqYucwfI9jUCzi4H1qSiXLGVi7DMgpZsQUQ0VMwICEc/j4:kIHziK1piXLGVE4UnZ0VJM

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.4MB

    • MD5

      c4fcff04ad51c7d31d9123b6f77eb5fc

    • SHA1

      02f7da11a0584442ef742dedd4071ee093f50954

    • SHA256

      7363441ed703a9b7f4697402e0a88eb7f515bd40c739dc8fafeef3285b6ea92b

    • SHA512

      edbf57cb41b9e04cafcbf02d01b47d094916c6ad5e1d7409983b5ccb6f25b02c32f6d314d2a6260db119b525db3b9179d0c34b04bd775e5077150fe9bab46408

    • SSDEEP

      196608:yUqYucwfI9jUCzi4H1qSiXLGVi7DMgpZsQUQ0VMwICEc/j4:kIHziK1piXLGVE4UnZ0VJM

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks