General
-
Target
UltraFPSBoost.exe
-
Size
19.5MB
-
Sample
240516-qsv8gafa6v
-
MD5
af434dc404808565c419f3e96797e476
-
SHA1
36b0683904570c822099c26e48b4b00524d7060e
-
SHA256
4e54e9cd693337dc91f4b3d6045c7980792d6c9afddc570aad758f2511c94d4f
-
SHA512
23fd4f85d5d360c37e457620c7eac7fb4957d5d73779da14a2007805ba7d1ced95bdbe64b5be8dc6d805988734d172998783bffe747c6db79f78ad909df6a824
-
SSDEEP
393216:No9DF23QD3Iot25L1V8deL+9qz8OTIRJ+7d6oHdETv1:y9o3QzIUKRh+9q4OTIR2hGT
Malware Config
Targets
-
-
Target
UltraFPSBoost.exe
-
Size
19.5MB
-
MD5
af434dc404808565c419f3e96797e476
-
SHA1
36b0683904570c822099c26e48b4b00524d7060e
-
SHA256
4e54e9cd693337dc91f4b3d6045c7980792d6c9afddc570aad758f2511c94d4f
-
SHA512
23fd4f85d5d360c37e457620c7eac7fb4957d5d73779da14a2007805ba7d1ced95bdbe64b5be8dc6d805988734d172998783bffe747c6db79f78ad909df6a824
-
SSDEEP
393216:No9DF23QD3Iot25L1V8deL+9qz8OTIRJ+7d6oHdETv1:y9o3QzIUKRh+9q4OTIR2hGT
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-