General

  • Target

    pythonamdexe64.exe

  • Size

    76.4MB

  • Sample

    241130-yrp9tsxpcl

  • MD5

    05071d2d23080e5ca78926595853803d

  • SHA1

    3cb55025a439fcd8da00db0101d09d97206dc4d7

  • SHA256

    635291ae466ffb3ede3b6ce91c8acedb0602a63eb381fcb82c98161b5850efb7

  • SHA512

    353bf8f5f5d3dafc4a32bf2e3939a9119d4a3e044e588c884bd4a9980e348ac031c48e250c1481d70776033c6412088c7154bee443d5503ea2fc657b40051699

  • SSDEEP

    1572864:R8Vlh9WZomcSk8IpG7V+VPhq6+4E7WCmlKriY4MHHLeqPNLtDP3gpZ1iSwr:RKz9momcSkB05aw6+8CmMcMHVLtDwpeS

Malware Config

Targets

    • Target

      pythonamdexe64.exe

    • Size

      76.4MB

    • MD5

      05071d2d23080e5ca78926595853803d

    • SHA1

      3cb55025a439fcd8da00db0101d09d97206dc4d7

    • SHA256

      635291ae466ffb3ede3b6ce91c8acedb0602a63eb381fcb82c98161b5850efb7

    • SHA512

      353bf8f5f5d3dafc4a32bf2e3939a9119d4a3e044e588c884bd4a9980e348ac031c48e250c1481d70776033c6412088c7154bee443d5503ea2fc657b40051699

    • SSDEEP

      1572864:R8Vlh9WZomcSk8IpG7V+VPhq6+4E7WCmlKriY4MHHLeqPNLtDP3gpZ1iSwr:RKz9momcSkB05aw6+8CmMcMHVLtDwpeS

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks