General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    241105-qq9yvatrgp

  • MD5

    fa4fc557950a266df87b3912636abbc5

  • SHA1

    d623118c49b7565378c77e235396adebca15ce60

  • SHA256

    77081c090f97f3a1935a14bd6954a165665bf66283e515387de57c9f5015a23d

  • SHA512

    624987d9ce2799c772175d874f9f7caa06be7a846a1d24f520cba36b752fccef04ffb5349ba29b84bb49b307abe92f9cd2f97d9e58fa4df85ad23631531d2a51

  • SSDEEP

    98304:gWEtdFB4PamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RKOLP4HEAiUy+:gVFiSeN/FJMIDJf0gsAGK4RRLP4Jin+

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      fa4fc557950a266df87b3912636abbc5

    • SHA1

      d623118c49b7565378c77e235396adebca15ce60

    • SHA256

      77081c090f97f3a1935a14bd6954a165665bf66283e515387de57c9f5015a23d

    • SHA512

      624987d9ce2799c772175d874f9f7caa06be7a846a1d24f520cba36b752fccef04ffb5349ba29b84bb49b307abe92f9cd2f97d9e58fa4df85ad23631531d2a51

    • SSDEEP

      98304:gWEtdFB4PamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RKOLP4HEAiUy+:gVFiSeN/FJMIDJf0gsAGK4RRLP4Jin+

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks