General

  • Target

    Release v0.21.0 Macro.exe

  • Size

    6.7MB

  • Sample

    250207-18j59a1jgs

  • MD5

    97ecf1c42bdd41b552efab84abec311f

  • SHA1

    d3c3761fc58c8661b1dd388bb48a10fff3e32bbc

  • SHA256

    5e8c2408b4f28f275bf3fad412eeb877e5d430e4d9e9e2086b3eaaed1be2c6b5

  • SHA512

    f359634c7bd2a73a1890e256bfd08b830d7eed25a45207af98ca208a975ba833dfbb7ddaaeb49fd1890ac8d64b6d886e0171f78a2c1a95326facb51b5a96ec08

  • SSDEEP

    196608:7NrAELeywI6DOYbwtZVZibPpG2QdetVg6naEku0:xdC5BbeYbhG2QdOVnaER0

Malware Config

Targets

    • Target

      Release v0.21.0 Macro.exe

    • Size

      6.7MB

    • MD5

      97ecf1c42bdd41b552efab84abec311f

    • SHA1

      d3c3761fc58c8661b1dd388bb48a10fff3e32bbc

    • SHA256

      5e8c2408b4f28f275bf3fad412eeb877e5d430e4d9e9e2086b3eaaed1be2c6b5

    • SHA512

      f359634c7bd2a73a1890e256bfd08b830d7eed25a45207af98ca208a975ba833dfbb7ddaaeb49fd1890ac8d64b6d886e0171f78a2c1a95326facb51b5a96ec08

    • SSDEEP

      196608:7NrAELeywI6DOYbwtZVZibPpG2QdetVg6naEku0:xdC5BbeYbhG2QdOVnaER0

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �*~=�.pyc

    • Size

      857B

    • MD5

      d5826dfd8f0a345d8eba5c5da3c6ff67

    • SHA1

      7d1c0c2917942831fa7a13fd1f60165042f61bc2

    • SHA256

      b5c12a05f364f3eadff532d899f708ff645da29551286150f1d05df94130c13c

    • SHA512

      44819c714fdb48510009c23949d52b565cb036b10a0888d6ed909d06160d7b330697ae9637ebe7c454b5d75b1ab0fb0aae58b86b07cfdbb527be2404248ecc4e

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks