General

  • Target

    projectera.exe

  • Size

    76.6MB

  • Sample

    241205-y69l1szqgz

  • MD5

    35cbd72c4ea08b56481431df776568d1

  • SHA1

    2873a8d688b886097fb321bf7f03d6e412eb085b

  • SHA256

    2115cc224c45992e5d6797da69498b9712f7ba7afb94d6053ecd7a7560b6d987

  • SHA512

    8426d9986d1617ee45fa17b958ceb5e218debcb339ee0ebc217480ba7d0399459bad85ebb2aa00aaa70bfc5ae78905bd67394073af404af042311d39f1a20f74

  • SSDEEP

    1572864:91l92WfmUSk8IpG7V+VPhqb+TUE7Tlhe7fEYiYweyJulZUdgRI6XPwfzmDtaJS:91KMmUSkB05awb+TVLPhpulvXztao

Malware Config

Targets

    • Target

      projectera.exe

    • Size

      76.6MB

    • MD5

      35cbd72c4ea08b56481431df776568d1

    • SHA1

      2873a8d688b886097fb321bf7f03d6e412eb085b

    • SHA256

      2115cc224c45992e5d6797da69498b9712f7ba7afb94d6053ecd7a7560b6d987

    • SHA512

      8426d9986d1617ee45fa17b958ceb5e218debcb339ee0ebc217480ba7d0399459bad85ebb2aa00aaa70bfc5ae78905bd67394073af404af042311d39f1a20f74

    • SSDEEP

      1572864:91l92WfmUSk8IpG7V+VPhqb+TUE7Tlhe7fEYiYweyJulZUdgRI6XPwfzmDtaJS:91KMmUSkB05awb+TVLPhpulvXztao

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks