General

  • Target

    KernelMapper.exe

  • Size

    7.6MB

  • Sample

    241102-re7vsawkbw

  • MD5

    de2184455261fe1ffb2cba15509c1c54

  • SHA1

    1dfa4bc9672657972505c83b6d5b9813b0c97e08

  • SHA256

    39faa548d1b841b8a4830651d8ad95acb8c97239993e9d37894281e97c9da64a

  • SHA512

    fdcf73f4bbda7c6c44d2d08a079fc8a83859d6404cffd512499d846c32bbf170609217bfa75117a2946f674b1af2d1bf3021397870a4fdb353a706413a38b36f

  • SSDEEP

    196608:IFHYY7wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jK:5IHziK1piXLGVE4Ue0VJ2

Malware Config

Targets

    • Target

      KernelMapper.exe

    • Size

      7.6MB

    • MD5

      de2184455261fe1ffb2cba15509c1c54

    • SHA1

      1dfa4bc9672657972505c83b6d5b9813b0c97e08

    • SHA256

      39faa548d1b841b8a4830651d8ad95acb8c97239993e9d37894281e97c9da64a

    • SHA512

      fdcf73f4bbda7c6c44d2d08a079fc8a83859d6404cffd512499d846c32bbf170609217bfa75117a2946f674b1af2d1bf3021397870a4fdb353a706413a38b36f

    • SSDEEP

      196608:IFHYY7wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jK:5IHziK1piXLGVE4Ue0VJ2

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks