General

  • Target

    setup.exe

  • Size

    6.0MB

  • Sample

    241103-ylmazs1rhx

  • MD5

    e7c43b74950a8c0934ddcf01283973ad

  • SHA1

    cfd687e9d8e8dff322b6952c86623ddcdf57ed59

  • SHA256

    5887b1b271c410d14752b4e57af2e7ea3e156529b207b8e1df98842548e4bb43

  • SHA512

    bb3ece0213adf8e9d33c1e881c60a84e922e0743bd61561f4356a3b431c94b7b96a90bc27472740355ca88a448867b6331f7a2d04357ec2d1fcd426c0f033c2d

  • SSDEEP

    98304:v6EtdFBCm/I5togamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RgOnAKdw6w:vBFIm/+oheN/FJMIDJf0gsAGK4RrnAKk

Malware Config

Targets

    • Target

      setup.exe

    • Size

      6.0MB

    • MD5

      e7c43b74950a8c0934ddcf01283973ad

    • SHA1

      cfd687e9d8e8dff322b6952c86623ddcdf57ed59

    • SHA256

      5887b1b271c410d14752b4e57af2e7ea3e156529b207b8e1df98842548e4bb43

    • SHA512

      bb3ece0213adf8e9d33c1e881c60a84e922e0743bd61561f4356a3b431c94b7b96a90bc27472740355ca88a448867b6331f7a2d04357ec2d1fcd426c0f033c2d

    • SSDEEP

      98304:v6EtdFBCm/I5togamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RgOnAKdw6w:vBFIm/+oheN/FJMIDJf0gsAGK4RrnAKk

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks