General

  • Target

    Synapse.Z (1).exe

  • Size

    712.0MB

  • Sample

    241105-e9eq9sxldk

  • MD5

    e7bda1f1b3150e1436adfa87bbe25307

  • SHA1

    d5056028f468c1cf95d8aa38b1522c67c99ca97b

  • SHA256

    02a802ac33889f32fa8792832883bc8f3e2da2fdbede78626127f8afe3b5e4a2

  • SHA512

    b51a01700c71df2b5333696154105300ce5cce4f1ac5b3ff6c8112e2b866915e4e1b4cbdaf590910b577890088a5ab699bc77ad475823a1da1760ee915393ea1

  • SSDEEP

    98304:ahSi8x9XQsD91urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC1I:aIP9VD3urErvI9pWjgfPvzm6gsFE14AI

Malware Config

Targets

    • Target

      Synapse.Z (1).exe

    • Size

      712.0MB

    • MD5

      e7bda1f1b3150e1436adfa87bbe25307

    • SHA1

      d5056028f468c1cf95d8aa38b1522c67c99ca97b

    • SHA256

      02a802ac33889f32fa8792832883bc8f3e2da2fdbede78626127f8afe3b5e4a2

    • SHA512

      b51a01700c71df2b5333696154105300ce5cce4f1ac5b3ff6c8112e2b866915e4e1b4cbdaf590910b577890088a5ab699bc77ad475823a1da1760ee915393ea1

    • SSDEEP

      98304:ahSi8x9XQsD91urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC1I:aIP9VD3urErvI9pWjgfPvzm6gsFE14AI

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks