General

  • Target

    Image Logger.exe

  • Size

    7.5MB

  • Sample

    241107-ljw17ayqez

  • MD5

    5ba3ae17650c299807abd942a56f5bbd

  • SHA1

    9b20c94fc03d0eda010c8bb8284bdc51ae3fa67b

  • SHA256

    3d19e841b77cc2e5b0edc0cd4dbdf3104f83f710cf83afa8f1e84b6c3011cd10

  • SHA512

    32dc03cc19836cd957d6e345a2a29e747bf61e08f4d59edb7e716a2a343a9039f60a5a1cfa1d59b081c0ac5a53a7aaa18d0f9399d383efc343e2d3d08eeaad93

  • SSDEEP

    196608:76gVVECwfI9jUC2gYBYv3vbW2+iITx1U6n6:fVVEBIH2gYBgDWJTnz6

Malware Config

Targets

    • Target

      Image Logger.exe

    • Size

      7.5MB

    • MD5

      5ba3ae17650c299807abd942a56f5bbd

    • SHA1

      9b20c94fc03d0eda010c8bb8284bdc51ae3fa67b

    • SHA256

      3d19e841b77cc2e5b0edc0cd4dbdf3104f83f710cf83afa8f1e84b6c3011cd10

    • SHA512

      32dc03cc19836cd957d6e345a2a29e747bf61e08f4d59edb7e716a2a343a9039f60a5a1cfa1d59b081c0ac5a53a7aaa18d0f9399d383efc343e2d3d08eeaad93

    • SSDEEP

      196608:76gVVECwfI9jUC2gYBYv3vbW2+iITx1U6n6:fVVEBIH2gYBgDWJTnz6

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks