General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    250221-pnppfstmt3

  • MD5

    fc9ef67fdee5e3a84424a111c8d22863

  • SHA1

    c2fd476b5ab7dcf48710321dc82c523b9773a95e

  • SHA256

    304657f0fd1a59e43888d857a3865ad827f36b146bc2af673afb746131199b20

  • SHA512

    d57480df92a4acc9b1c21b2c725cd9f651db3c76f8c98c7a4124ac0b29fd36026450bac69945f8f1c13e6fe1fb314da31d09ee927d682dca191cc87a1cdb8d5c

  • SSDEEP

    196608:pWq04y9NHeNTfm/pf+xk4dWRimrbW3jmyQ:U7Uy/pWu4kRimrbmyX

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      fc9ef67fdee5e3a84424a111c8d22863

    • SHA1

      c2fd476b5ab7dcf48710321dc82c523b9773a95e

    • SHA256

      304657f0fd1a59e43888d857a3865ad827f36b146bc2af673afb746131199b20

    • SHA512

      d57480df92a4acc9b1c21b2c725cd9f651db3c76f8c98c7a4124ac0b29fd36026450bac69945f8f1c13e6fe1fb314da31d09ee927d682dca191cc87a1cdb8d5c

    • SSDEEP

      196608:pWq04y9NHeNTfm/pf+xk4dWRimrbW3jmyQ:U7Uy/pWu4kRimrbmyX

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks