General
-
Target
MWIII.exe
-
Size
8.2MB
-
Sample
240929-z5bh9sveqa
-
MD5
f9614eeffb3084d1dfc428a55a93580d
-
SHA1
901f6cd3aae8c42f01b90112929e1c68221d24a1
-
SHA256
c5ef2c5b9a5acba1131e46f564800752f337e31c38b29e171eba5d0adb783f0d
-
SHA512
192d346473631160eaedd524a6a9331d9c81a545ab84a76fd26503145c6305bb344f682bf9c798df64833c597e4636e769b8243cd1d6f496120d67d21244713b
-
SSDEEP
196608:2dg8VElwfI9jUC2gYBYv3vbW4SEf+iITx1U6nI:X8VEKIH2gYBgDWZjTnzI
Malware Config
Targets
-
-
Target
MWIII.exe
-
Size
8.2MB
-
MD5
f9614eeffb3084d1dfc428a55a93580d
-
SHA1
901f6cd3aae8c42f01b90112929e1c68221d24a1
-
SHA256
c5ef2c5b9a5acba1131e46f564800752f337e31c38b29e171eba5d0adb783f0d
-
SHA512
192d346473631160eaedd524a6a9331d9c81a545ab84a76fd26503145c6305bb344f682bf9c798df64833c597e4636e769b8243cd1d6f496120d67d21244713b
-
SSDEEP
196608:2dg8VElwfI9jUC2gYBYv3vbW4SEf+iITx1U6nI:X8VEKIH2gYBgDWZjTnzI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-