General
-
Target
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40
-
Size
2.3MB
-
Sample
240602-wax71aaf92
-
MD5
82a2c8b40869774186e5e2740d8b40fa
-
SHA1
def495427e6eb7f077ba3b899d616cbc0ee9d843
-
SHA256
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40
-
SHA512
e70e201b7d074f70c2a03a37cd3d0c2b2a38819a3ad6df92f135735b4ccc95fd38a40614d719c6dbebc16af11fd8f636b240cd872060e2a432cecc6dba94ea98
-
SSDEEP
49152:TazkgLSy3/lzCjrsaziVwKcgFHwakqXfd+/9AF0aRER0vNgt:TaYgLdEuTkqXf0F7ewkQ
Behavioral task
behavioral1
Sample
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40
-
Size
2.3MB
-
MD5
82a2c8b40869774186e5e2740d8b40fa
-
SHA1
def495427e6eb7f077ba3b899d616cbc0ee9d843
-
SHA256
1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40
-
SHA512
e70e201b7d074f70c2a03a37cd3d0c2b2a38819a3ad6df92f135735b4ccc95fd38a40614d719c6dbebc16af11fd8f636b240cd872060e2a432cecc6dba94ea98
-
SSDEEP
49152:TazkgLSy3/lzCjrsaziVwKcgFHwakqXfd+/9AF0aRER0vNgt:TaYgLdEuTkqXf0F7ewkQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-