Resubmissions

22-11-2024 05:08

241122-fswtwsvmb1 10

21-11-2024 22:41

241121-2l6leayme1 10

21-11-2024 22:40

241121-2lrggsymex 10

21-11-2024 22:28

241121-2dmhkaylcy 10

General

  • Target

    Built.exe

  • Size

    8.4MB

  • Sample

    241121-2lrggsymex

  • MD5

    ab0c18c1152d24e36df057b6630330dc

  • SHA1

    4fd504eb196439de1d918151b82f7a472a42df45

  • SHA256

    f5a3409e62770b9769d8edd41c840257542bf338a0e4718616e217e4a6c41fe3

  • SHA512

    9c17d6077a3f8659e01ca46f6aa06a49a4cb6e2db059de9fab1a5bcbfd074105ecd60243b97da75095f60b02f8a3d6eff2f0eac08fd3cbdf8a53d12454c32187

  • SSDEEP

    196608:3Dg0UwfI9jUC2gYBYv3vbWz9q//zsLe9j3lt:c0rIH2gYBgDWU/7sLkzlt

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.4MB

    • MD5

      ab0c18c1152d24e36df057b6630330dc

    • SHA1

      4fd504eb196439de1d918151b82f7a472a42df45

    • SHA256

      f5a3409e62770b9769d8edd41c840257542bf338a0e4718616e217e4a6c41fe3

    • SHA512

      9c17d6077a3f8659e01ca46f6aa06a49a4cb6e2db059de9fab1a5bcbfd074105ecd60243b97da75095f60b02f8a3d6eff2f0eac08fd3cbdf8a53d12454c32187

    • SSDEEP

      196608:3Dg0UwfI9jUC2gYBYv3vbWz9q//zsLe9j3lt:c0rIH2gYBgDWU/7sLkzlt

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks