General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
240904-zhyqaawbrp
-
MD5
1f0a281980efab8f4f042f1951766821
-
SHA1
a4356202728f9f7f1cafd743c3606cdfefae8512
-
SHA256
9b25a93cbe88895f2018cfb82ba1c8552f7c566d496deebd4d7aa3648ee1c44b
-
SHA512
2e7a8b9fe9c0967390d7eb748b1b0f8dbc961c6ee21e83a681bb5441f2da2ae8ff6ebad15eb10d0dce8e4db66da663e5bcc2bed79b500e1b15294448a340f4f1
-
SSDEEP
98304:4WDjWM8JEE1rKYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIF6:4W0aZeNTfm/pf+xk4dWRatrbWOjgKQ
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
1f0a281980efab8f4f042f1951766821
-
SHA1
a4356202728f9f7f1cafd743c3606cdfefae8512
-
SHA256
9b25a93cbe88895f2018cfb82ba1c8552f7c566d496deebd4d7aa3648ee1c44b
-
SHA512
2e7a8b9fe9c0967390d7eb748b1b0f8dbc961c6ee21e83a681bb5441f2da2ae8ff6ebad15eb10d0dce8e4db66da663e5bcc2bed79b500e1b15294448a340f4f1
-
SSDEEP
98304:4WDjWM8JEE1rKYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIF6:4W0aZeNTfm/pf+xk4dWRatrbWOjgKQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-