General

  • Target

    Saturno Duper V2.exe

  • Size

    8.3MB

  • Sample

    241103-zl5m1awrbj

  • MD5

    3333853951c399841f8c1a0322c95a27

  • SHA1

    714917ffd18ab25dec43b01f3be388ff435626cb

  • SHA256

    90e2ee8d265667ca0618d55e5e7d223745a230c4a77c5901698e8205264f1065

  • SHA512

    be08f781e31b677b85b86cf23a582a23c7c867940521b612ed28cd35436b94895a100f4af5291b94060e37044734043390f94ac09ac05bead9d5c5518f7f6f9d

  • SSDEEP

    196608:tPgJ0VEYwfI9jUC2gYBYv3vbW4SEf+iITx1U6nL:uKVEHIH2gYBgDWZjTnzL

Malware Config

Targets

    • Target

      Saturno Duper V2.exe

    • Size

      8.3MB

    • MD5

      3333853951c399841f8c1a0322c95a27

    • SHA1

      714917ffd18ab25dec43b01f3be388ff435626cb

    • SHA256

      90e2ee8d265667ca0618d55e5e7d223745a230c4a77c5901698e8205264f1065

    • SHA512

      be08f781e31b677b85b86cf23a582a23c7c867940521b612ed28cd35436b94895a100f4af5291b94060e37044734043390f94ac09ac05bead9d5c5518f7f6f9d

    • SSDEEP

      196608:tPgJ0VEYwfI9jUC2gYBYv3vbW4SEf+iITx1U6nL:uKVEHIH2gYBgDWZjTnzL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks