General

  • Target

    YgsT7e3.exe

  • Size

    7.5MB

  • Sample

    241106-zgs4eaxhql

  • MD5

    447cd15038b7e48dd7b774c3e0a85525

  • SHA1

    b6d6c15b6f8c1c035df15740a55dd555bb548d51

  • SHA256

    6fc0a20651cdca892b2bb1fb78176ef5febf231811f824994ebe4af3e43f6171

  • SHA512

    371cd81c257478171fb95059419482f46f18e82304aa9a821b3b5c19295d9bc089ec4529ae2e359173c77af6894761eea402534cd43bd4b539d3db39c298380a

  • SSDEEP

    196608:EdhhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsp:WPurEUWjZZ4dDLIeyzWtPTNzp

Malware Config

Targets

    • Target

      YgsT7e3.exe

    • Size

      7.5MB

    • MD5

      447cd15038b7e48dd7b774c3e0a85525

    • SHA1

      b6d6c15b6f8c1c035df15740a55dd555bb548d51

    • SHA256

      6fc0a20651cdca892b2bb1fb78176ef5febf231811f824994ebe4af3e43f6171

    • SHA512

      371cd81c257478171fb95059419482f46f18e82304aa9a821b3b5c19295d9bc089ec4529ae2e359173c77af6894761eea402534cd43bd4b539d3db39c298380a

    • SSDEEP

      196608:EdhhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsp:WPurEUWjZZ4dDLIeyzWtPTNzp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks