General

  • Target

    32626327474272.exe

  • Size

    25.0MB

  • Sample

    250208-qeskeswphw

  • MD5

    61205f1b286e003d454604f262796515

  • SHA1

    79c91b2fa72e2ff5ef2aede68843c99cbed6ce28

  • SHA256

    8279de6ed3e59bac2f3aa33a81361b245bae0125b1fbc80f4323e5f2f60afc06

  • SHA512

    d9aca65a9160b1f45d29f0eeaa0866d47392b7ae30e17d846bd33e944f53ca882b98ad883be0fe8a4b50edcc0ecca867a65dfdfcc6f7dea571be1eda59604645

  • SSDEEP

    98304:x9DjWM8JEE1F+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFWe:x90FeNTfm/pf+xk4dWRimrbW3jmy4

Malware Config

Targets

    • Target

      32626327474272.exe

    • Size

      25.0MB

    • MD5

      61205f1b286e003d454604f262796515

    • SHA1

      79c91b2fa72e2ff5ef2aede68843c99cbed6ce28

    • SHA256

      8279de6ed3e59bac2f3aa33a81361b245bae0125b1fbc80f4323e5f2f60afc06

    • SHA512

      d9aca65a9160b1f45d29f0eeaa0866d47392b7ae30e17d846bd33e944f53ca882b98ad883be0fe8a4b50edcc0ecca867a65dfdfcc6f7dea571be1eda59604645

    • SSDEEP

      98304:x9DjWM8JEE1F+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFWe:x90FeNTfm/pf+xk4dWRimrbW3jmy4

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks