General

  • Target

    36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79

  • Size

    7.5MB

  • Sample

    241104-z6lqmaxjbw

  • MD5

    807f3c82e4fd6a4eb94cd4fba6d06619

  • SHA1

    3e7f8c2f439e0e0c376ec38a992a63e088dcaf5a

  • SHA256

    36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79

  • SHA512

    79fdb321ab0f5e4f7cd180b422bf2600bbab74d988d98c316723e381026b982a54e1d1e2659084006c214065d60663301c1dfdb919ec5c38497551bd6e65820d

  • SSDEEP

    196608:F5gVVEDwfI9jUC2gYBYv3vbW2+iITx1U6ni:UVVEwIH2gYBgDWJTnzi

Malware Config

Targets

    • Target

      36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79

    • Size

      7.5MB

    • MD5

      807f3c82e4fd6a4eb94cd4fba6d06619

    • SHA1

      3e7f8c2f439e0e0c376ec38a992a63e088dcaf5a

    • SHA256

      36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79

    • SHA512

      79fdb321ab0f5e4f7cd180b422bf2600bbab74d988d98c316723e381026b982a54e1d1e2659084006c214065d60663301c1dfdb919ec5c38497551bd6e65820d

    • SSDEEP

      196608:F5gVVEDwfI9jUC2gYBYv3vbW2+iITx1U6ni:UVVEwIH2gYBgDWJTnzi

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks