Resubmissions
30/06/2024, 14:47
240630-r5yd2azbnc 10General
-
Target
source_prepared.exe
-
Size
80.8MB
-
Sample
240630-r5yd2azbnc
-
MD5
5b2f632326d1e591fa9f2c273c8f1d7c
-
SHA1
005fa2e5d28a0d5841287e3005736785db9167b5
-
SHA256
ce6f0168ee93332c4702d83435e3251d8d038308532c73b375f6a63fc8130b23
-
SHA512
259b66adc435765b702a9217d04cc7271ab44e86f60943e428a8e211c750570567bf077c7d7c69a10688a6bd82f5e0c26ad9e4367411e1b43b51fe3104854e7f
-
SSDEEP
1572864:UvNBYQglX2XaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IlWq95q3cJX0:UvNBYxRtSkB05awb+Tfe25FS395F0
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.8MB
-
MD5
5b2f632326d1e591fa9f2c273c8f1d7c
-
SHA1
005fa2e5d28a0d5841287e3005736785db9167b5
-
SHA256
ce6f0168ee93332c4702d83435e3251d8d038308532c73b375f6a63fc8130b23
-
SHA512
259b66adc435765b702a9217d04cc7271ab44e86f60943e428a8e211c750570567bf077c7d7c69a10688a6bd82f5e0c26ad9e4367411e1b43b51fe3104854e7f
-
SSDEEP
1572864:UvNBYQglX2XaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IlWq95q3cJX0:UvNBYxRtSkB05awb+Tfe25FS395F0
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-