General

  • Target

    cheat loader.exe

  • Size

    7.7MB

  • Sample

    241101-x8b8vsthrg

  • MD5

    cd7ced7032f8a2e05a460f0579c3daba

  • SHA1

    6c84735e5ee871284487fcf4644047fd3cc9f7a7

  • SHA256

    5c6b8f80ecef33db96e30a29a71b48e3ff7dcf4e6bb3c1ac84e183e9359f6a80

  • SHA512

    927bc7f65717eae87981df12274a0cb8d8bb809ea0f5bf1bef222f6aa29efdfcc557adfc6ca18c6d8f80c6b35c5c5ba908b53e0243a24139bde6fb3d1a0d5634

  • SSDEEP

    196608:UG0fFneNTfm/pf+xk4dNSESRpmrbW3jmrU:ry/pWu4m5RpmrbmyrU

Malware Config

Targets

    • Target

      cheat loader.exe

    • Size

      7.7MB

    • MD5

      cd7ced7032f8a2e05a460f0579c3daba

    • SHA1

      6c84735e5ee871284487fcf4644047fd3cc9f7a7

    • SHA256

      5c6b8f80ecef33db96e30a29a71b48e3ff7dcf4e6bb3c1ac84e183e9359f6a80

    • SHA512

      927bc7f65717eae87981df12274a0cb8d8bb809ea0f5bf1bef222f6aa29efdfcc557adfc6ca18c6d8f80c6b35c5c5ba908b53e0243a24139bde6fb3d1a0d5634

    • SSDEEP

      196608:UG0fFneNTfm/pf+xk4dNSESRpmrbW3jmrU:ry/pWu4m5RpmrbmyrU

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks