General

  • Target

    Built.exe

  • Size

    8.2MB

  • Sample

    250114-dbpyxaxjhr

  • MD5

    2a6f831ae5bf9c87d9ab9e13ea8a44b0

  • SHA1

    a65b63ca6492fe87fea30c0692ce12acf8f42c12

  • SHA256

    f369b199d697c429062ce6dc0bf92eaa19d0ab4bbd2cd0b090d4b15b28c28eef

  • SHA512

    29898248be3591d805be9d4000442c226836518fd580b7ddf9ce7b81433d05928355fdb40f40e3cdbb17362a29241d46ac66c92f7998c32fe9050a1bfbe53049

  • SSDEEP

    196608:ADRkdewfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWD:AaLIHL7HmBYXrkRoaUNQ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.2MB

    • MD5

      2a6f831ae5bf9c87d9ab9e13ea8a44b0

    • SHA1

      a65b63ca6492fe87fea30c0692ce12acf8f42c12

    • SHA256

      f369b199d697c429062ce6dc0bf92eaa19d0ab4bbd2cd0b090d4b15b28c28eef

    • SHA512

      29898248be3591d805be9d4000442c226836518fd580b7ddf9ce7b81433d05928355fdb40f40e3cdbb17362a29241d46ac66c92f7998c32fe9050a1bfbe53049

    • SSDEEP

      196608:ADRkdewfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWD:AaLIHL7HmBYXrkRoaUNQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks