General

  • Target

    Disabler

  • Size

    7.5MB

  • Sample

    241104-s1lp4ssbne

  • MD5

    a3aead8cd0dbd2c03bf5a6b8b5b6b73d

  • SHA1

    03fb8c5f2728479060249bc1f2988efe34e71499

  • SHA256

    87ed23b4639c7ad635236ebeb98376a4cd24c25382e2be7d49cd5066e4b53b85

  • SHA512

    ac38156a781bdceeb7975830c159327df3d92aacc6b7f9dce54294df6f971c981ad762b1475ac6d676e949e457259884ceff3491ddc9b5141c98a6c8744487b5

  • SSDEEP

    196608:D7hhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsk:jrurEUWjZZ4dDLIeyzWtPTNzk

Malware Config

Targets

    • Target

      Disabler

    • Size

      7.5MB

    • MD5

      a3aead8cd0dbd2c03bf5a6b8b5b6b73d

    • SHA1

      03fb8c5f2728479060249bc1f2988efe34e71499

    • SHA256

      87ed23b4639c7ad635236ebeb98376a4cd24c25382e2be7d49cd5066e4b53b85

    • SHA512

      ac38156a781bdceeb7975830c159327df3d92aacc6b7f9dce54294df6f971c981ad762b1475ac6d676e949e457259884ceff3491ddc9b5141c98a6c8744487b5

    • SSDEEP

      196608:D7hhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsk:jrurEUWjZZ4dDLIeyzWtPTNzk

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks