General
-
Target
svchost.exe
-
Size
80.3MB
-
Sample
240509-tsvtgsba2w
-
MD5
41faf7f3ca7ace4ac2597ce2514a45ba
-
SHA1
19da50aa961b4af2b8c87f553a1259ae1e0f5046
-
SHA256
ec4a0285a16d5859c047121ffb1ba1886f1facd0f697721bd468e77dc3b41682
-
SHA512
286c412b5a1218c5c17108d9b834d59cdd6aea4e78a6858d4c486c96e403d17dc22a46fe81d19e97764c30f8875cb83d28a0215d616a2597d9acbdb908915195
-
SSDEEP
1572864:/vNBYQ3j0B3Sk8IpG7V+VPhqcPE70jC2iYgj+h58sMwVWd9//LBcJzqA:/vNBY+CSkB05awcVuI5B09/jWq
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
svchost.exe
-
Size
80.3MB
-
MD5
41faf7f3ca7ace4ac2597ce2514a45ba
-
SHA1
19da50aa961b4af2b8c87f553a1259ae1e0f5046
-
SHA256
ec4a0285a16d5859c047121ffb1ba1886f1facd0f697721bd468e77dc3b41682
-
SHA512
286c412b5a1218c5c17108d9b834d59cdd6aea4e78a6858d4c486c96e403d17dc22a46fe81d19e97764c30f8875cb83d28a0215d616a2597d9acbdb908915195
-
SSDEEP
1572864:/vNBYQ3j0B3Sk8IpG7V+VPhqcPE70jC2iYgj+h58sMwVWd9//LBcJzqA:/vNBY+CSkB05awcVuI5B09/jWq
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Adds Run key to start application
-