General

  • Target

    Releasev0.21.0Macro.exe

  • Size

    6.7MB

  • Sample

    250209-m2jz1syjgs

  • MD5

    97ecf1c42bdd41b552efab84abec311f

  • SHA1

    d3c3761fc58c8661b1dd388bb48a10fff3e32bbc

  • SHA256

    5e8c2408b4f28f275bf3fad412eeb877e5d430e4d9e9e2086b3eaaed1be2c6b5

  • SHA512

    f359634c7bd2a73a1890e256bfd08b830d7eed25a45207af98ca208a975ba833dfbb7ddaaeb49fd1890ac8d64b6d886e0171f78a2c1a95326facb51b5a96ec08

  • SSDEEP

    196608:7NrAELeywI6DOYbwtZVZibPpG2QdetVg6naEku0:xdC5BbeYbhG2QdOVnaER0

Malware Config

Targets

    • Target

      Releasev0.21.0Macro.exe

    • Size

      6.7MB

    • MD5

      97ecf1c42bdd41b552efab84abec311f

    • SHA1

      d3c3761fc58c8661b1dd388bb48a10fff3e32bbc

    • SHA256

      5e8c2408b4f28f275bf3fad412eeb877e5d430e4d9e9e2086b3eaaed1be2c6b5

    • SHA512

      f359634c7bd2a73a1890e256bfd08b830d7eed25a45207af98ca208a975ba833dfbb7ddaaeb49fd1890ac8d64b6d886e0171f78a2c1a95326facb51b5a96ec08

    • SSDEEP

      196608:7NrAELeywI6DOYbwtZVZibPpG2QdetVg6naEku0:xdC5BbeYbhG2QdOVnaER0

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks