General

  • Target

    StaticSpoofer.exe

  • Size

    6.0MB

  • Sample

    250220-3rqmtayjdn

  • MD5

    7f41fa77289b5dcbf2b275f53400dc9f

  • SHA1

    5abe20d8ff3e1803fe123062419eb1a6e1c4c42c

  • SHA256

    0f22c5e450d7f02b0cff4a78ceaaf589c4f9f9d1929907c2ecdab0350b5edc4c

  • SHA512

    26b20604b33117403b36339286b1340a81d13087249ee07418b179887c05ad68b38f254cb6a555296b4218b1e7410baa8d0dfb71ae4ada4cbb506bf83ac2e328

  • SSDEEP

    98304:iWVEtdFBTYUh3amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R8PMQI/OxMWP:iWsFSu6eN/FJMIDJf0gsAGK4R8kQeWaO

Malware Config

Targets

    • Target

      StaticSpoofer.exe

    • Size

      6.0MB

    • MD5

      7f41fa77289b5dcbf2b275f53400dc9f

    • SHA1

      5abe20d8ff3e1803fe123062419eb1a6e1c4c42c

    • SHA256

      0f22c5e450d7f02b0cff4a78ceaaf589c4f9f9d1929907c2ecdab0350b5edc4c

    • SHA512

      26b20604b33117403b36339286b1340a81d13087249ee07418b179887c05ad68b38f254cb6a555296b4218b1e7410baa8d0dfb71ae4ada4cbb506bf83ac2e328

    • SSDEEP

      98304:iWVEtdFBTYUh3amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R8PMQI/OxMWP:iWsFSu6eN/FJMIDJf0gsAGK4R8kQeWaO

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks