General
-
Target
8920c6867df1eeaec33e3e6253524700
-
Size
534KB
-
Sample
201025-h2yr68pw5j
-
MD5
8920c6867df1eeaec33e3e6253524700
-
SHA1
4ce786281b76b6949166092faa9bfccee4e2c599
-
SHA256
b126d2bf73da9bce2f1a0748febb99510127eee852284a75c777ebac33b39649
-
SHA512
fec621690ca21fc62a46c6b285a0bad0d6f3e4c792997616216b227b5a01db78b1b769c4847f3b6d0bc70d95f12b73885156b3164f319cda5d44b34861ef12e2
Static task
static1
Behavioral task
behavioral1
Sample
8920c6867df1eeaec33e3e6253524700.exe
Resource
win7
Malware Config
Targets
-
-
Target
8920c6867df1eeaec33e3e6253524700
-
Size
534KB
-
MD5
8920c6867df1eeaec33e3e6253524700
-
SHA1
4ce786281b76b6949166092faa9bfccee4e2c599
-
SHA256
b126d2bf73da9bce2f1a0748febb99510127eee852284a75c777ebac33b39649
-
SHA512
fec621690ca21fc62a46c6b285a0bad0d6f3e4c792997616216b227b5a01db78b1b769c4847f3b6d0bc70d95f12b73885156b3164f319cda5d44b34861ef12e2
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-