General

  • Target

    Builder.exe

  • Size

    7.3MB

  • Sample

    250208-arz72avrez

  • MD5

    a215edd9d9788492b561858e44184bca

  • SHA1

    77d8816ecce79f525c118687149e2f3b68dcb984

  • SHA256

    7fbbefdae9adf0f81808b9decf48c08ba4a47293e80cd4855c083ab1f392c184

  • SHA512

    64dfdf28e74a95af3cef3ad89b45d656bb49fba705665aad7878a397f18ae1c1a7e1aca2df466e80179f130b5350f0ac1eea26affe940742c2c42b8930f035ff

  • SSDEEP

    196608:uuWYS6uOshoKMuIkhVastRL5Di3uq1D7mW:IYShOshouIkPftRL54DRX

Malware Config

Targets

    • Target

      Builder.exe

    • Size

      7.3MB

    • MD5

      a215edd9d9788492b561858e44184bca

    • SHA1

      77d8816ecce79f525c118687149e2f3b68dcb984

    • SHA256

      7fbbefdae9adf0f81808b9decf48c08ba4a47293e80cd4855c083ab1f392c184

    • SHA512

      64dfdf28e74a95af3cef3ad89b45d656bb49fba705665aad7878a397f18ae1c1a7e1aca2df466e80179f130b5350f0ac1eea26affe940742c2c42b8930f035ff

    • SSDEEP

      196608:uuWYS6uOshoKMuIkhVastRL5Di3uq1D7mW:IYShOshouIkPftRL54DRX

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      )x�)S �.pyc

    • Size

      1KB

    • MD5

      678811a6d8ea18b754991c102285d807

    • SHA1

      a5cc5a9cadb76df14854cd1f1157e34736391eb2

    • SHA256

      707c908162b05553a4dace4456b8a359061f42f5cb318292339bfea84d7dff4b

    • SHA512

      9b039a4cde6e2b4997480b3fe987d54e896f2f709e92c1eeaad6bdcda939dc770b5da36bff59ff88643196cfc51ad291e8b3b2d1e00a5fed578b84d28fd1510b

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks