General

  • Target

    NexusFiveM.zip

  • Size

    7.6MB

  • Sample

    250210-nydjhazlfn

  • MD5

    c2054a9d1afb4539237720949c77da10

  • SHA1

    0ad2fe6d71bb9c1f7f93974711957f60336a3b9d

  • SHA256

    8d347ae2354b8e5e89fe1423c55b67d7d3b27f280b71187c89cc3a6b62ee74ff

  • SHA512

    188c12313abb0cb5888e1dee155aac4813c284c232d63c04550342773fa62a76ec21ba0cddfbf363d0c14cd2eaa9a47316ddfff2f65fb0050bc69a1dac4c47f1

  • SSDEEP

    196608:0LRgFWwfI9jUC2gYBYv3vbWY+iITm1U6fd1Ed:8yFdIH2gYBgDW/TOzbO

Malware Config

Targets

    • Target

      NexusFiveM/NexusFiveM.exe

    • Size

      7.6MB

    • MD5

      4e4b715046fa491f2566949a8323fb78

    • SHA1

      335060ed70f4ee3471cd2ddce245e57e623e109a

    • SHA256

      8d847a8e298457cd0f8f249457ee75ca62f1a73a39a0748841eda05eb99f8fcf

    • SHA512

      9970f79ddc60a7bcd14c0de9f56091fd0d7033f533774f728a1cf1ceef15e9cebb3a7777b9ad17c5ce3fd12ec9bcd80d7fbdc387f279743af87d6d0fa8077845

    • SSDEEP

      196608:TLRgFWwfI9jUC2gYBYv3vbWY+iITm1U6fd1Ed:PyFdIH2gYBgDW/TOzb6

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks