General
-
Target
ArksSpoofer.exe
-
Size
7.4MB
-
Sample
240719-t3pefszepk
-
MD5
7595fe6971a43a4632a6c299fad98eb5
-
SHA1
5e7217f1e7d9adcb6bd3d64497a9d6ee908900b9
-
SHA256
cb30f10a94216876421b20d4177829fd4856ca9f52f620f61914144a5371aa4c
-
SHA512
b1665c2e667e9dbed544fb59742df18c107c3be2690a6f8afa91917508e80818ba7522578c4e0799753922bd396b827592de80a6fc7c6257983d7d9964094011
-
SSDEEP
196608:mOP9VXMo8urErvI9pWjgfPvzm6gsFE14An:7ldh8urEUWjC3zDb04An
Behavioral task
behavioral1
Sample
ArksSpoofer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ArksSpoofer.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
ArksSpoofer.exe
-
Size
7.4MB
-
MD5
7595fe6971a43a4632a6c299fad98eb5
-
SHA1
5e7217f1e7d9adcb6bd3d64497a9d6ee908900b9
-
SHA256
cb30f10a94216876421b20d4177829fd4856ca9f52f620f61914144a5371aa4c
-
SHA512
b1665c2e667e9dbed544fb59742df18c107c3be2690a6f8afa91917508e80818ba7522578c4e0799753922bd396b827592de80a6fc7c6257983d7d9964094011
-
SSDEEP
196608:mOP9VXMo8urErvI9pWjgfPvzm6gsFE14An:7ldh8urEUWjC3zDb04An
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-