General

  • Target

    Matcha.exe

  • Size

    7.6MB

  • Sample

    250210-wke46s1ley

  • MD5

    ea2885da07a18951c0f063bd6e244f55

  • SHA1

    a074281e64211ef780619c8b70e8fc4cd4cc3dad

  • SHA256

    58bc24efadd5c97059f106947c2b2514c1e01dfed6a5caa9a335838f340396c9

  • SHA512

    d4d9bfe7e3ec61911e8c90f049a9e60ce5dbe1b09766f007ac55c0a982494e3fa90ea2eb58326c71a1e07022352467185aaea25d23099fb9bf0eba2b699a4418

  • SSDEEP

    196608:AWM06C1wfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoA:iIH20drLYRZjoA

Malware Config

Targets

    • Target

      Matcha.exe

    • Size

      7.6MB

    • MD5

      ea2885da07a18951c0f063bd6e244f55

    • SHA1

      a074281e64211ef780619c8b70e8fc4cd4cc3dad

    • SHA256

      58bc24efadd5c97059f106947c2b2514c1e01dfed6a5caa9a335838f340396c9

    • SHA512

      d4d9bfe7e3ec61911e8c90f049a9e60ce5dbe1b09766f007ac55c0a982494e3fa90ea2eb58326c71a1e07022352467185aaea25d23099fb9bf0eba2b699a4418

    • SSDEEP

      196608:AWM06C1wfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoA:iIH20drLYRZjoA

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      *�&��.pyc

    • Size

      1KB

    • MD5

      69a6e657ca7992f82fc7320283f533ac

    • SHA1

      01a312d2bd94307ab639436759f20ddf5c7e722a

    • SHA256

      18affb4722cabd67b682443ae10c7f9fa6d95e6270e5646222a48f8e5b1fe6bb

    • SHA512

      71789b27498460af4490d85e38174151893729280bad52d9d8b49d23e68a28977094fc81ca9330b00757bd720e839c84d08227ce2d293a98b5b5d2c1ba79fc2a

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks