General

  • Target

    068ad2d85aea37b7fd2f4c353ccf9001fbcf266a37a66db6379f70a82caae22d

  • Size

    7.7MB

  • Sample

    241105-ybqweswpe1

  • MD5

    d014887bdadda019ba8f2e67fc0ea72a

  • SHA1

    6bb73cdda0f674c7320a9a9bf69ab31245430908

  • SHA256

    068ad2d85aea37b7fd2f4c353ccf9001fbcf266a37a66db6379f70a82caae22d

  • SHA512

    89f4e247663d014007b03bcaf83f834380caecf4e742216afd7b79d200b41354440f8cc8a7cac9beacf737a03a2c1900f7a42a683f225e3609b1e1774242252d

  • SSDEEP

    98304:GRNzHqdVfB2T0S27wHn2ByuT/9vUIdD9C+z3zO917vOTh+ezDNhCSpXq4JvmJ1nV:GPQsT52BbT/9bvLz3S1bA3zCSEpn97Yc

Malware Config

Targets

    • Target

      068ad2d85aea37b7fd2f4c353ccf9001fbcf266a37a66db6379f70a82caae22d

    • Size

      7.7MB

    • MD5

      d014887bdadda019ba8f2e67fc0ea72a

    • SHA1

      6bb73cdda0f674c7320a9a9bf69ab31245430908

    • SHA256

      068ad2d85aea37b7fd2f4c353ccf9001fbcf266a37a66db6379f70a82caae22d

    • SHA512

      89f4e247663d014007b03bcaf83f834380caecf4e742216afd7b79d200b41354440f8cc8a7cac9beacf737a03a2c1900f7a42a683f225e3609b1e1774242252d

    • SSDEEP

      98304:GRNzHqdVfB2T0S27wHn2ByuT/9vUIdD9C+z3zO917vOTh+ezDNhCSpXq4JvmJ1nV:GPQsT52BbT/9bvLz3S1bA3zCSEpn97Yc

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks