General
-
Target
grabber.rar
-
Size
8.1MB
-
Sample
240929-tbpadazgmn
-
MD5
8c7071b3ff16ec5df602289aded0bc7f
-
SHA1
b9a015a54d8beaf1d2af8b71a647372048b5c334
-
SHA256
c2c33a53eda1b170ff38a2cb03cfc11bf5d9cfed21702dba8d71b18fe0bf5387
-
SHA512
b99b372bfe1ae976c7dc87f7e257fe50dd2c506de8c09bdeb0c5c072e42b540bd5c688b6e5abf539b53d80e7c5a1c22a65e3f3f11e91612e29083ec18e1670ef
-
SSDEEP
196608:IA8INT6FEINYcsybzEBiv89gwRYL93YG7/N0oDJL7FkJ:sXEINYcsyb4yMgFYWqyJi
Behavioral task
behavioral1
Sample
builder/builder.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
builder/builder.exe
-
Size
8.2MB
-
MD5
d6ff056792c4ad8b7ba9a14e4d7eaea2
-
SHA1
a93e806ded47f0c7b679dd679d1acb7825731efb
-
SHA256
ad9cfa3f185881933a15502cefd27c26ab1364504c0b46cb6211bc56e64a8527
-
SHA512
28e03a20559446da0c7c4d633ded26d2141dfa0e8788bbc00e9ae55632c1876579f32564b67bfbb44bcbbef0b22c610f8faf98e6a2e5e9a4627ba8d78a537c45
-
SSDEEP
196608:fQWBsdurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:pmurEUWjZZ4dDLIeW7zWGPTNCp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-