General
-
Target
IMAGELOGGER3.5.exe
-
Size
10.0MB
-
Sample
240925-qp9axs1cng
-
MD5
d1f9a9801179ccadeba0ad3f17ae625c
-
SHA1
2f14fc55495bf64334d4f58f9502070e2d85bb11
-
SHA256
e554952326f15d85c11577f2841342fffb630d492de83799ef0457f2b19af8a1
-
SHA512
1e5fde6d994f7794346a36f0e34e029e806f65da3ff90db9844a444329def21834aa1372df44e47ff74bf66cdf43393b3fc1319a4c4bc5a55cf96415f9cb9ad6
-
SSDEEP
196608:Nw8POLjv+bhqNVoB0SEsucQZ41JBbIM11tW:+8PyL+9qz80SJHQK1Jx1vW
Behavioral task
behavioral1
Sample
IMAGELOGGER3.5.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
IMAGELOGGER3.5.exe
-
Size
10.0MB
-
MD5
d1f9a9801179ccadeba0ad3f17ae625c
-
SHA1
2f14fc55495bf64334d4f58f9502070e2d85bb11
-
SHA256
e554952326f15d85c11577f2841342fffb630d492de83799ef0457f2b19af8a1
-
SHA512
1e5fde6d994f7794346a36f0e34e029e806f65da3ff90db9844a444329def21834aa1372df44e47ff74bf66cdf43393b3fc1319a4c4bc5a55cf96415f9cb9ad6
-
SSDEEP
196608:Nw8POLjv+bhqNVoB0SEsucQZ41JBbIM11tW:+8PyL+9qz80SJHQK1Jx1vW
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-