General

  • Target

    f5ed1872c0ac59b87345ffe3f2e4d57b8587a3a9823fb71c7cfaa6ebf553401b.exe

  • Size

    6.9MB

  • Sample

    241202-r8kx4sykds

  • MD5

    2bfb70c2b5f54fef4b8a9ef1d46ab3be

  • SHA1

    ca0c75b92efb4e967c2e471c4398c62875570cbd

  • SHA256

    f5ed1872c0ac59b87345ffe3f2e4d57b8587a3a9823fb71c7cfaa6ebf553401b

  • SHA512

    d9e795231f627d1ba4644f409d6c49c60ef3d34be906ba64f174b0977820ec153d359a0be33f322701f5635cb699d6bef879968208d0e137f8110ea6125be8e2

  • SSDEEP

    98304:1hDjWM8JEE1FouddamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEC:1h0GeNTfm/pf+xk4dWRpmrbW3jmrT

Malware Config

Targets

    • Target

      f5ed1872c0ac59b87345ffe3f2e4d57b8587a3a9823fb71c7cfaa6ebf553401b.exe

    • Size

      6.9MB

    • MD5

      2bfb70c2b5f54fef4b8a9ef1d46ab3be

    • SHA1

      ca0c75b92efb4e967c2e471c4398c62875570cbd

    • SHA256

      f5ed1872c0ac59b87345ffe3f2e4d57b8587a3a9823fb71c7cfaa6ebf553401b

    • SHA512

      d9e795231f627d1ba4644f409d6c49c60ef3d34be906ba64f174b0977820ec153d359a0be33f322701f5635cb699d6bef879968208d0e137f8110ea6125be8e2

    • SSDEEP

      98304:1hDjWM8JEE1FouddamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEC:1h0GeNTfm/pf+xk4dWRpmrbW3jmrT

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks