General
-
Target
source_prepared.exe
-
Size
80.9MB
-
Sample
240828-t9tmraybrj
-
MD5
01dfff92552543795a59f3965f8ca75a
-
SHA1
761930c16bf20277ff440fb35c73639510ff68be
-
SHA256
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37
-
SHA512
e3c0bb33e383e5f9b5dd757c46fa4009981c619294af0cd23464fbc5b772fb473b50096246969dd22ac3f484a81a68e18310c3b54402e455e7d5b24108c629ef
-
SSDEEP
1572864:UvxZQglXJdW67vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IH9rWocJXt:UvxZxRLVeSkB05awb+Tfe25F09rit
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.9MB
-
MD5
01dfff92552543795a59f3965f8ca75a
-
SHA1
761930c16bf20277ff440fb35c73639510ff68be
-
SHA256
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37
-
SHA512
e3c0bb33e383e5f9b5dd757c46fa4009981c619294af0cd23464fbc5b772fb473b50096246969dd22ac3f484a81a68e18310c3b54402e455e7d5b24108c629ef
-
SSDEEP
1572864:UvxZQglXJdW67vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IH9rWocJXt:UvxZxRLVeSkB05awb+Tfe25F09rit
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-