General

  • Target

    Follower Bot.exe

  • Size

    7.7MB

  • Sample

    241103-at6slazcmd

  • MD5

    00795eb0d3bf1ea6bca9140e56847ec8

  • SHA1

    2c22c8c21979f95257c949fb0510a82cdec1d14f

  • SHA256

    dcd8268eb6001eec3464d43de36d05f7858b352c41eed900248cfa26aff8868a

  • SHA512

    efbaeb8152e063a188f44ccc21a8e13a24a584ceb7b3a795a13634ae9cdca7df542f13858e8023670bd00b41b509f9e48a1cfffcc812048656b0adae71b350df

  • SSDEEP

    196608:P30CfQJyeNTfm/pf+xk4dNSESRatrbWOjgKi:3Uy/pWu4m5RatrbvMKi

Malware Config

Targets

    • Target

      Follower Bot.exe

    • Size

      7.7MB

    • MD5

      00795eb0d3bf1ea6bca9140e56847ec8

    • SHA1

      2c22c8c21979f95257c949fb0510a82cdec1d14f

    • SHA256

      dcd8268eb6001eec3464d43de36d05f7858b352c41eed900248cfa26aff8868a

    • SHA512

      efbaeb8152e063a188f44ccc21a8e13a24a584ceb7b3a795a13634ae9cdca7df542f13858e8023670bd00b41b509f9e48a1cfffcc812048656b0adae71b350df

    • SSDEEP

      196608:P30CfQJyeNTfm/pf+xk4dNSESRatrbWOjgKi:3Uy/pWu4m5RatrbvMKi

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks