General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241105-aesmeszfrg

  • MD5

    b259f7f2b05dab8902e9b402a810d2fa

  • SHA1

    407a91ffb220c35f0ef8e8750bcf63f303388da7

  • SHA256

    993c6344cd9034bfd85aa0ecd5a55048e8135d1c705060199fc8dd2c7c6192d5

  • SHA512

    9dc74c1b3f7422bbfb8c5e6fa413e78ea0e752bfc2bd4ee53e4009f9f15ced6d621cc2599bd40ada1afaf00c80d8ffb4ebaf326428cc0e69e50739bb977d92a3

  • SSDEEP

    98304:rMDjWM8JEE1FrJbxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE9:rM09+eNTfm/pf+xk4dWRpmrbW3jmr4

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      b259f7f2b05dab8902e9b402a810d2fa

    • SHA1

      407a91ffb220c35f0ef8e8750bcf63f303388da7

    • SHA256

      993c6344cd9034bfd85aa0ecd5a55048e8135d1c705060199fc8dd2c7c6192d5

    • SHA512

      9dc74c1b3f7422bbfb8c5e6fa413e78ea0e752bfc2bd4ee53e4009f9f15ced6d621cc2599bd40ada1afaf00c80d8ffb4ebaf326428cc0e69e50739bb977d92a3

    • SSDEEP

      98304:rMDjWM8JEE1FrJbxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE9:rM09+eNTfm/pf+xk4dWRpmrbW3jmr4

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks