General
-
Target
sipy.exe
-
Size
15.5MB
-
Sample
240519-xkt4rscf42
-
MD5
7f864172c9c2ba147afb4bfaa23a12eb
-
SHA1
aba19ef4ec3f8133cc11f26bb187f3dc75a9c93e
-
SHA256
2718f768e2809cda78cb7e0d70fc32b875aab6637e9a2d9cbb5a3193f9f250ca
-
SHA512
34d1d767b004983c77804257f6735a644b9cb8bfe14044591bf7a517f2ea468d3f06880fd3a8a0d37c180cd5c5010f42bdf508e6875b08c32159699916c79517
-
SSDEEP
393216:8o9Ddnnx8ZlaetEL+9qz8/Ck+7q3D1JF1bWXiWCUI:p9Znx6s+9q4N3D1NtVUI
Malware Config
Targets
-
-
Target
sipy.exe
-
Size
15.5MB
-
MD5
7f864172c9c2ba147afb4bfaa23a12eb
-
SHA1
aba19ef4ec3f8133cc11f26bb187f3dc75a9c93e
-
SHA256
2718f768e2809cda78cb7e0d70fc32b875aab6637e9a2d9cbb5a3193f9f250ca
-
SHA512
34d1d767b004983c77804257f6735a644b9cb8bfe14044591bf7a517f2ea468d3f06880fd3a8a0d37c180cd5c5010f42bdf508e6875b08c32159699916c79517
-
SSDEEP
393216:8o9Ddnnx8ZlaetEL+9qz8/Ck+7q3D1JF1bWXiWCUI:p9Znx6s+9q4N3D1NtVUI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-