General

  • Target

    X.exe

  • Size

    7.6MB

  • Sample

    241103-gpzbaaxbrq

  • MD5

    1557e66ff5ddaa80ef07dfa354ded14d

  • SHA1

    47801305beedb12fb18793023f7309ed36c2f30f

  • SHA256

    d47005069444c5baab5a3d54d80e6dd969e5a6037bcf80f4c4b0e90f946db00c

  • SHA512

    bce1b14830ba2893ed0adac546c63f21aacbca219b422ba11b0b4ce671dad8536f72274f9f06ba006b2a19fc6504219aa84ea1967eaebca40ab1dae5fae5d28f

  • SSDEEP

    196608:NoHY57wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:oIHziK1piXLGVE4Ue0VJB

Malware Config

Targets

    • Target

      X.exe

    • Size

      7.6MB

    • MD5

      1557e66ff5ddaa80ef07dfa354ded14d

    • SHA1

      47801305beedb12fb18793023f7309ed36c2f30f

    • SHA256

      d47005069444c5baab5a3d54d80e6dd969e5a6037bcf80f4c4b0e90f946db00c

    • SHA512

      bce1b14830ba2893ed0adac546c63f21aacbca219b422ba11b0b4ce671dad8536f72274f9f06ba006b2a19fc6504219aa84ea1967eaebca40ab1dae5fae5d28f

    • SSDEEP

      196608:NoHY57wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:oIHziK1piXLGVE4Ue0VJB

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks