General
-
Target
aimassisttest.exe
-
Size
694KB
-
Sample
240509-a6ws6abe25
-
MD5
d80f020bddcb97b95fda92c49d90fe14
-
SHA1
4784e925aa4baa90f0de62f3a775c04ec2b9a6f5
-
SHA256
9a5850a5a14e84fd7953672ab84ac973d1ee07e85b6bf5702b2a581969a66b52
-
SHA512
83deb65171cbfe4078c772687f466efc8e52344fce8a5377bf29eccd528f9d8b27453a5423e5a9e91e4af9e8ec7ec72ef08be08651bfe0faddea74cdd8a8c1fa
-
SSDEEP
12288:oU+9H3900EJqrekLEyTYQcDL/TNuUCziP6VFGO5lrEaKYNtcBvAuvlee2NCFbLkH:oU+9XNrenyktDLdYNtcdvQNC9wHAP5cX
Static task
static1
Malware Config
Targets
-
-
Target
aimassisttest.exe
-
Size
694KB
-
MD5
d80f020bddcb97b95fda92c49d90fe14
-
SHA1
4784e925aa4baa90f0de62f3a775c04ec2b9a6f5
-
SHA256
9a5850a5a14e84fd7953672ab84ac973d1ee07e85b6bf5702b2a581969a66b52
-
SHA512
83deb65171cbfe4078c772687f466efc8e52344fce8a5377bf29eccd528f9d8b27453a5423e5a9e91e4af9e8ec7ec72ef08be08651bfe0faddea74cdd8a8c1fa
-
SSDEEP
12288:oU+9H3900EJqrekLEyTYQcDL/TNuUCziP6VFGO5lrEaKYNtcBvAuvlee2NCFbLkH:oU+9XNrenyktDLdYNtcdvQNC9wHAP5cX
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-