Resubmissions
28/09/2024, 07:45
240928-jlmt7athqn 10General
-
Target
KesSOLundetectedVER.exe
-
Size
8.1MB
-
Sample
240928-jlmt7athqn
-
MD5
ce29a3227d6597372144f02d1773b0ca
-
SHA1
2c57706335f5a30a9c508cfbbb7629522d2e69ce
-
SHA256
5e09cbe6156ffbe6213aab3457c281edb30e137b70db09fb7d06e5e6e7637406
-
SHA512
b22dca978ac30b49c4ed5caebd008af6f85b8aa4e759168fddb2b70f0c2f489410fcb3bc42be51aa57fe19d3cbb78549060947abe5d5216ec381e0ad81c1681e
-
SSDEEP
196608:1g0YC3NvUeeNTfm/pf+xk4dfrl7RptrbWOjgrp:c0Nchy/pWu4NpRptrbvMrp
Malware Config
Targets
-
-
Target
KesSOLundetectedVER.exe
-
Size
8.1MB
-
MD5
ce29a3227d6597372144f02d1773b0ca
-
SHA1
2c57706335f5a30a9c508cfbbb7629522d2e69ce
-
SHA256
5e09cbe6156ffbe6213aab3457c281edb30e137b70db09fb7d06e5e6e7637406
-
SHA512
b22dca978ac30b49c4ed5caebd008af6f85b8aa4e759168fddb2b70f0c2f489410fcb3bc42be51aa57fe19d3cbb78549060947abe5d5216ec381e0ad81c1681e
-
SSDEEP
196608:1g0YC3NvUeeNTfm/pf+xk4dfrl7RptrbWOjgrp:c0Nchy/pWu4NpRptrbvMrp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-