General

  • Target

    Built.exe

  • Size

    7.4MB

  • Sample

    250210-wy1m2a1lbn

  • MD5

    1180a2369c7c67cf88c11d79db3050b9

  • SHA1

    5906f9cf24d5c87b408f4fc17c9b7f2867430ef7

  • SHA256

    2c1599ce9dc98d6ba85eb8f1d90a8d784dcfea8ed165e24560094a3408e1619b

  • SHA512

    2bd1b4cc8bc20c7b90e9c9fdfb01b8684c3ec8307918dc3b46f7585868355ee3e0a467089b0c87865469fd2ebde4b0b3aa4f9dda4e665f08c220e66ea39fefc0

  • SSDEEP

    196608:NWL0cDNP59Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhM:XiNPvL+9qz8/b4IRv3WhM

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.4MB

    • MD5

      1180a2369c7c67cf88c11d79db3050b9

    • SHA1

      5906f9cf24d5c87b408f4fc17c9b7f2867430ef7

    • SHA256

      2c1599ce9dc98d6ba85eb8f1d90a8d784dcfea8ed165e24560094a3408e1619b

    • SHA512

      2bd1b4cc8bc20c7b90e9c9fdfb01b8684c3ec8307918dc3b46f7585868355ee3e0a467089b0c87865469fd2ebde4b0b3aa4f9dda4e665f08c220e66ea39fefc0

    • SSDEEP

      196608:NWL0cDNP59Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhM:XiNPvL+9qz8/b4IRv3WhM

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks