General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241104-rwaxdazrdy

  • MD5

    ad8ee72da097607430ec3e7693fe1a6b

  • SHA1

    88000ffee497932a03ff0d9370f6558ffd01513c

  • SHA256

    772b29d83d6c4cd7b2f40f249a48e5ca6fb2ec2e3d0e0ba99fc5e40cf38bae5f

  • SHA512

    b35578fb1fa1a7bd471559f7f180463ee25b7ff4aafc5fe068def804b7bd058003359998650e78b6489c92f979e6cc92cbb47963b9dae0505f38e4b21071dbe4

  • SSDEEP

    98304:PVpyDjWM8JEE1FUamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIy:Ly0neNTfm/pf+xk4dWRpmrbW3jmrQ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      ad8ee72da097607430ec3e7693fe1a6b

    • SHA1

      88000ffee497932a03ff0d9370f6558ffd01513c

    • SHA256

      772b29d83d6c4cd7b2f40f249a48e5ca6fb2ec2e3d0e0ba99fc5e40cf38bae5f

    • SHA512

      b35578fb1fa1a7bd471559f7f180463ee25b7ff4aafc5fe068def804b7bd058003359998650e78b6489c92f979e6cc92cbb47963b9dae0505f38e4b21071dbe4

    • SSDEEP

      98304:PVpyDjWM8JEE1FUamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIy:Ly0neNTfm/pf+xk4dWRpmrbW3jmrQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks