General
-
Target
bulked-spoof.exe
-
Size
17.0MB
-
Sample
240504-v2l4dafe79
-
MD5
eb7ddb67f4fb04777df8e2953a867bbe
-
SHA1
a6735bd3e44bca0997f3911da372689e254cad86
-
SHA256
4399046ebac5b5f6f5f6acb0826feca5a9c91bfba05a4d9dce6eb6c1d2b28c2b
-
SHA512
f376b7915f5b60a939cb280195faed19bf8cd91f53dc6cfad95f8d1e7d5ecd90595f1f2d18191efc184cf5b7fdf4eb6ba0c7d330d0a767e252f188cf4f52d520
-
SSDEEP
393216:Hv9EokQhXGYFaoh2Jp5M6SAeYIG2QqzmB1SQRC0:P92QfFaoh4F/vq+11RL
Malware Config
Targets
-
-
Target
bulked-spoof.exe
-
Size
17.0MB
-
MD5
eb7ddb67f4fb04777df8e2953a867bbe
-
SHA1
a6735bd3e44bca0997f3911da372689e254cad86
-
SHA256
4399046ebac5b5f6f5f6acb0826feca5a9c91bfba05a4d9dce6eb6c1d2b28c2b
-
SHA512
f376b7915f5b60a939cb280195faed19bf8cd91f53dc6cfad95f8d1e7d5ecd90595f1f2d18191efc184cf5b7fdf4eb6ba0c7d330d0a767e252f188cf4f52d520
-
SSDEEP
393216:Hv9EokQhXGYFaoh2Jp5M6SAeYIG2QqzmB1SQRC0:P92QfFaoh4F/vq+11RL
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-