Resubmissions

20/11/2024, 02:41

241120-c6pe7atmbm 8

General

  • Target

    qZBMopqFzc.exe

  • Size

    10.9MB

  • Sample

    241120-c6pe7atmbm

  • MD5

    4e150098282968ae53f70cb438b7ac54

  • SHA1

    5b75c311c5cb4f34f91795c58d1f8ba3bc8d12a6

  • SHA256

    c089ff775a43c52eb5ffa830c82f66f4b24301b5472c0b8a7b63988e13481d33

  • SHA512

    fc25f6667db912120237b8a0767ea5a12a34963c0615a0c633e1741a38e2f91f9de721699ddf5db1ee2368caf67b297ec25e34aa81ad0dee9bfc943626fa9ce3

  • SSDEEP

    98304:67wDkgcrK0K+LZi5a7eOGGFPv5JInm66wuL:wwDRG9hZi5a7uGF35e76BL

Malware Config

Targets

    • Target

      qZBMopqFzc.exe

    • Size

      10.9MB

    • MD5

      4e150098282968ae53f70cb438b7ac54

    • SHA1

      5b75c311c5cb4f34f91795c58d1f8ba3bc8d12a6

    • SHA256

      c089ff775a43c52eb5ffa830c82f66f4b24301b5472c0b8a7b63988e13481d33

    • SHA512

      fc25f6667db912120237b8a0767ea5a12a34963c0615a0c633e1741a38e2f91f9de721699ddf5db1ee2368caf67b297ec25e34aa81ad0dee9bfc943626fa9ce3

    • SSDEEP

      98304:67wDkgcrK0K+LZi5a7eOGGFPv5JInm66wuL:wwDRG9hZi5a7uGF35e76BL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks