General
-
Target
Evolution.exe
-
Size
31.2MB
-
Sample
240531-nest3sgb52
-
MD5
08fb33bdf4080c02ec6ba47705b56053
-
SHA1
fa357caee3c400ba3a45d7decd2839e385edb843
-
SHA256
f3a7f1289bfa4483d5fc6758a2137eb85f8cbd1c75f31574514d95bcfffd7d6a
-
SHA512
06a6ac0e9e65d3bbfc0bc1058abb71b73610e00e4405e18c0ba6dd3ee4e571477d0d8d699e033a664bae7d6466b18d70864cdaca55718f40cca85a08d7b21f10
-
SSDEEP
786432:tpbi9YQFS1QtIJ2j6+s7LWB75zuPNdS3ILn6eEFRJu++da:e9zOiIJ2qHWB75iVdSGgFebA
Behavioral task
behavioral1
Sample
Evolution.exe
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
Evolution.exe
-
Size
31.2MB
-
MD5
08fb33bdf4080c02ec6ba47705b56053
-
SHA1
fa357caee3c400ba3a45d7decd2839e385edb843
-
SHA256
f3a7f1289bfa4483d5fc6758a2137eb85f8cbd1c75f31574514d95bcfffd7d6a
-
SHA512
06a6ac0e9e65d3bbfc0bc1058abb71b73610e00e4405e18c0ba6dd3ee4e571477d0d8d699e033a664bae7d6466b18d70864cdaca55718f40cca85a08d7b21f10
-
SSDEEP
786432:tpbi9YQFS1QtIJ2j6+s7LWB75zuPNdS3ILn6eEFRJu++da:e9zOiIJ2qHWB75iVdSGgFebA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-