General
-
Target
wincore-dll.com.exe
-
Size
15.6MB
-
Sample
240720-bmyn3stbne
-
MD5
461571c9b19dafc8ec3cf49d5b0c18d2
-
SHA1
d798620036607df06e6acee5e0a6b27e4f31b9d6
-
SHA256
b99cfae0221698800a666683726103763b201f74913722e5d8c9e9fe328ad2ba
-
SHA512
efc6f60b63f2f9cc23ac89ccca4534842506c8a27c24113574718755213fbdb8b2ab0ee1da7bd6dffbde741893ead3b826af664597af4d728b12c9d9d035d0ba
-
SSDEEP
393216:uo9DvJYctSme+7/pWbkRlH2B6eiWdp9w0P5YjaHm:P97JY6Fe+7/pW6uWOvKjaG
Behavioral task
behavioral1
Sample
wincore-dll.com.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
wincore-dll.com.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
wincore-dll.com.exe
-
Size
15.6MB
-
MD5
461571c9b19dafc8ec3cf49d5b0c18d2
-
SHA1
d798620036607df06e6acee5e0a6b27e4f31b9d6
-
SHA256
b99cfae0221698800a666683726103763b201f74913722e5d8c9e9fe328ad2ba
-
SHA512
efc6f60b63f2f9cc23ac89ccca4534842506c8a27c24113574718755213fbdb8b2ab0ee1da7bd6dffbde741893ead3b826af664597af4d728b12c9d9d035d0ba
-
SSDEEP
393216:uo9DvJYctSme+7/pWbkRlH2B6eiWdp9w0P5YjaHm:P97JY6Fe+7/pW6uWOvKjaG
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-