General

  • Target

    saikucord.exe

  • Size

    8.4MB

  • Sample

    250208-ytcfra1ncs

  • MD5

    260712bf45b34f65d693fc351b782095

  • SHA1

    6c9e34a4e17bd1d3a1ab57b74ac5b202036bd263

  • SHA256

    b9e83c9540c89607016af6d8f8e10159b3cd6724573f84d874f156c1ae0a1fe4

  • SHA512

    3f69e12d64394fce33a7f0039e5620acbd95fc7a64c4e10c87aa3a2ca47e0f4b0c8b513de8b8e8ea6aa7aa51d63f037a4b9ec564afa5a0d7f03ba784a7ff7cbe

  • SSDEEP

    196608:UmDRkdDwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWK:pa2IHL7HmBYXrkRoaUNt

Malware Config

Targets

    • Target

      saikucord.exe

    • Size

      8.4MB

    • MD5

      260712bf45b34f65d693fc351b782095

    • SHA1

      6c9e34a4e17bd1d3a1ab57b74ac5b202036bd263

    • SHA256

      b9e83c9540c89607016af6d8f8e10159b3cd6724573f84d874f156c1ae0a1fe4

    • SHA512

      3f69e12d64394fce33a7f0039e5620acbd95fc7a64c4e10c87aa3a2ca47e0f4b0c8b513de8b8e8ea6aa7aa51d63f037a4b9ec564afa5a0d7f03ba784a7ff7cbe

    • SSDEEP

      196608:UmDRkdDwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWK:pa2IHL7HmBYXrkRoaUNt

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks