General
-
Target
Built.exe
-
Size
7.4MB
-
Sample
250210-xkg47s1rar
-
MD5
57e14e0d76776d91ca553b493a96a707
-
SHA1
d557a93eee09e7173f798c201b7ddd61a8b8bca9
-
SHA256
6766651f430020f4690e11f3c4093dd22142dcc59acf9587cf7de9e2d10d44bd
-
SHA512
e4d8e94f3ec46840207748e95a13976952a604be74f35a324dc0e6af3f6a4044c34d0ddf04d3d3435505ba2da6bf2194e7d22e46c52c4b41187df5c3bf88b568
-
SSDEEP
196608:8WX0cDHHYe+Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhJ:uinwL+9qz8/b4IRv3WhJ
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.4MB
-
MD5
57e14e0d76776d91ca553b493a96a707
-
SHA1
d557a93eee09e7173f798c201b7ddd61a8b8bca9
-
SHA256
6766651f430020f4690e11f3c4093dd22142dcc59acf9587cf7de9e2d10d44bd
-
SHA512
e4d8e94f3ec46840207748e95a13976952a604be74f35a324dc0e6af3f6a4044c34d0ddf04d3d3435505ba2da6bf2194e7d22e46c52c4b41187df5c3bf88b568
-
SSDEEP
196608:8WX0cDHHYe+Ljv+bhqNVoBKUh8mz4Iv9PPv1DVWhJ:uinwL+9qz8/b4IRv3WhJ
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1