General

  • Target

    5m redengine tracers blocker.exe

  • Size

    6.0MB

  • Sample

    250116-zc2vraymcr

  • MD5

    27d20b07fa1bbacf14e9fed3c7a4c726

  • SHA1

    d28d71bfa9747d4fbafb2ece41292fb2949d7dc6

  • SHA256

    7063954b61b528c121e2f92c88a10ae8d32d050197db36cd173c8639db403ca4

  • SHA512

    c1a97da1ff97a3a723c893b0bb08db52d67d986abe255c8739663fac460aee5db274bb3e508fda5f5a5869e2bdac1437ca757b50207e2a06ec2a921fccdf91c4

  • SSDEEP

    98304:c1Iu4+DcdxiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMm63UoMl:cKp+Dm1eNoInY7/sHfbRy9ZmvWDQKT+

Malware Config

Targets

    • Target

      5m redengine tracers blocker.exe

    • Size

      6.0MB

    • MD5

      27d20b07fa1bbacf14e9fed3c7a4c726

    • SHA1

      d28d71bfa9747d4fbafb2ece41292fb2949d7dc6

    • SHA256

      7063954b61b528c121e2f92c88a10ae8d32d050197db36cd173c8639db403ca4

    • SHA512

      c1a97da1ff97a3a723c893b0bb08db52d67d986abe255c8739663fac460aee5db274bb3e508fda5f5a5869e2bdac1437ca757b50207e2a06ec2a921fccdf91c4

    • SSDEEP

      98304:c1Iu4+DcdxiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMm63UoMl:cKp+Dm1eNoInY7/sHfbRy9ZmvWDQKT+

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks