General

  • Target

    MVPloader.exe

  • Size

    7.6MB

  • Sample

    241103-pl9lvawrfq

  • MD5

    2400f4a5ae3cd363fc4864a8ffbf6afd

  • SHA1

    4cdd65283c1cc6b3142c9111d68f3c9eaf020479

  • SHA256

    c2e6d938996e5a5a3a9e724b3d828b9eccd8c60f2fa7a30af81eccdad6f0e9b3

  • SHA512

    cc3e340d4c02f89c11f8a6e2f8cd9a971da98794fd13044cfd97c90c2e39de546b8793a47c3949ace8a2b983501c353c76d7abbcbd9f1b1c5271058d1721375a

  • SSDEEP

    196608:CwHYT+wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jY:+IHziK1piXLGVE4Ue0VJs

Malware Config

Targets

    • Target

      MVPloader.exe

    • Size

      7.6MB

    • MD5

      2400f4a5ae3cd363fc4864a8ffbf6afd

    • SHA1

      4cdd65283c1cc6b3142c9111d68f3c9eaf020479

    • SHA256

      c2e6d938996e5a5a3a9e724b3d828b9eccd8c60f2fa7a30af81eccdad6f0e9b3

    • SHA512

      cc3e340d4c02f89c11f8a6e2f8cd9a971da98794fd13044cfd97c90c2e39de546b8793a47c3949ace8a2b983501c353c76d7abbcbd9f1b1c5271058d1721375a

    • SSDEEP

      196608:CwHYT+wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jY:+IHziK1piXLGVE4Ue0VJs

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks