General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
240712-tt2y7a1djj
-
MD5
63854c57a2edea5bbc7bab1e778512b1
-
SHA1
80b3488de6fe2bc12b798ca29c2e854cc66f361f
-
SHA256
53b6ca1e637d4cb2d5e003e7857f171c60fa41883f71c0dcec7c7807e1cad8f9
-
SHA512
016b5d11bd6fd9c536cd01f7130c37d5b998ac6fdea99a016dd603af7760c301dd5c454bba6c7a496d0e598147274df90f3c85cc686f1364e972f18c6b254dc9
-
SSDEEP
98304:MdDjWM8JEE1rQamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFWC:Md0heNTfm/pf+xk4dWRatrbWOjgKR
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
�rsش'.pyc
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
63854c57a2edea5bbc7bab1e778512b1
-
SHA1
80b3488de6fe2bc12b798ca29c2e854cc66f361f
-
SHA256
53b6ca1e637d4cb2d5e003e7857f171c60fa41883f71c0dcec7c7807e1cad8f9
-
SHA512
016b5d11bd6fd9c536cd01f7130c37d5b998ac6fdea99a016dd603af7760c301dd5c454bba6c7a496d0e598147274df90f3c85cc686f1364e972f18c6b254dc9
-
SSDEEP
98304:MdDjWM8JEE1rQamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFWC:Md0heNTfm/pf+xk4dWRatrbWOjgKR
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
�rsش'.pyc
-
Size
1KB
-
MD5
30de9f3ea34f0c86bd3d38b8b006edf6
-
SHA1
f17292fc562cab3ae089f2cbf2ab8854cac67b34
-
SHA256
cc4465b769191b283937cc6b25636057d5faf1d8cd8456c3ebea29d04588cd6b
-
SHA512
96ccce0b1c7332002a5c1505ed6194c4f5941a16abdd6ff4627a9398e13533b76d41ce3c6b7769d6b7481ef2a782dfdddf2bc343c5d49949a4a7632475c40d65
Score1/10 -