General
-
Target
Test.exe
-
Size
7.4MB
-
Sample
240527-a131aaaa4z
-
MD5
569afc6c928504cc4d3cf4b4936d6874
-
SHA1
82896a9c75ae5d3680c3b2017912501958e7b86c
-
SHA256
45f1bde758b218562cc91da3dd5a14ab0974a9d12c345dd522f9696a1ae901ca
-
SHA512
e4d6a373dcc7118534abdd516159f048c732e91dba7b77b11530e88eae2a53d886bc564a30053f4b1b58c112c3a586e68e64da00aa832e1483277ebbe907781a
-
SSDEEP
196608:trvqP9V3/vurErvI9pWjgfPvzm6gsFEB4AuC:Il9urEUWjC3zDb84AuC
Behavioral task
behavioral1
Sample
Test.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
Test.exe
-
Size
7.4MB
-
MD5
569afc6c928504cc4d3cf4b4936d6874
-
SHA1
82896a9c75ae5d3680c3b2017912501958e7b86c
-
SHA256
45f1bde758b218562cc91da3dd5a14ab0974a9d12c345dd522f9696a1ae901ca
-
SHA512
e4d6a373dcc7118534abdd516159f048c732e91dba7b77b11530e88eae2a53d886bc564a30053f4b1b58c112c3a586e68e64da00aa832e1483277ebbe907781a
-
SSDEEP
196608:trvqP9V3/vurErvI9pWjgfPvzm6gsFEB4AuC:Il9urEUWjC3zDb84AuC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-