General
-
Target
VxrusHisVirus.exe
-
Size
7.5MB
-
Sample
240929-yaxbta1eka
-
MD5
6110ef13b9ac28d2db493cc9e9a8d877
-
SHA1
046208f499a506d0bd29a868e3efec7a88fc3430
-
SHA256
57c8cf68f41a31f229822852043acfd80f8d64f72b47a32caacb4a457d880356
-
SHA512
4c94dbef75681c7491118fcad8d440a295ba35802f3606b1c37563ad4c505edf820379a8230f60a8676fa21e9c474a26e2638ac6526430b1ca1513fec5db3d48
-
SSDEEP
196608:IzgVVEbpVwfI9jUC2gYBYv3vbW2+iITx1U6ny:LVVEsIH2gYBgDWJTnzy
Behavioral task
behavioral1
Sample
VxrusHisVirus.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
VxrusHisVirus.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
2qty�!.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2qty�!.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
VxrusHisVirus.exe
-
Size
7.5MB
-
MD5
6110ef13b9ac28d2db493cc9e9a8d877
-
SHA1
046208f499a506d0bd29a868e3efec7a88fc3430
-
SHA256
57c8cf68f41a31f229822852043acfd80f8d64f72b47a32caacb4a457d880356
-
SHA512
4c94dbef75681c7491118fcad8d440a295ba35802f3606b1c37563ad4c505edf820379a8230f60a8676fa21e9c474a26e2638ac6526430b1ca1513fec5db3d48
-
SSDEEP
196608:IzgVVEbpVwfI9jUC2gYBYv3vbW2+iITx1U6ny:LVVEsIH2gYBgDWJTnzy
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
2qty�!.pyc
-
Size
1KB
-
MD5
05b28a3a1c77405e75d1b418a0f9e088
-
SHA1
e89c85427b0c4606186a7c70d68de896dd3fb92c
-
SHA256
3449894dd0e05f5b6b6572ca9e11fe665082a28988f5872b61e330498b9da836
-
SHA512
02e6a7be28d01e9b2a26d5812087e0c46b6d06332856ccfacf4a50178f419c506d47b18c4103d478f45bdbc021c84dc246c277dd3040d352f032ecd13357dce0
Score1/10 -