General

  • Target

    cracker.exe

  • Size

    10.0MB

  • Sample

    241102-vmyhvszhrk

  • MD5

    703feb5fbaf00c7ad974ef9fbb4a3245

  • SHA1

    a80c349ccc0affd70f9eddaefa6a4c60d42bd1c5

  • SHA256

    bfc3f0bae22eb2953e3c853389d4a086fda1232dd1bacd0af2ddb470f2f47727

  • SHA512

    0f827ac29ec4398c21b5b68119a859d96287242f1db01a5e86f439c41e15617da12a25b7c592ed13b363973a82543f323682c763e3426d298f7fb284e529faab

  • SSDEEP

    196608:8FunqZ67wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSd:374IH2XgHq+jq93Yos

Malware Config

Targets

    • Target

      cracker.exe

    • Size

      10.0MB

    • MD5

      703feb5fbaf00c7ad974ef9fbb4a3245

    • SHA1

      a80c349ccc0affd70f9eddaefa6a4c60d42bd1c5

    • SHA256

      bfc3f0bae22eb2953e3c853389d4a086fda1232dd1bacd0af2ddb470f2f47727

    • SHA512

      0f827ac29ec4398c21b5b68119a859d96287242f1db01a5e86f439c41e15617da12a25b7c592ed13b363973a82543f323682c763e3426d298f7fb284e529faab

    • SSDEEP

      196608:8FunqZ67wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSd:374IH2XgHq+jq93Yos

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks