General
-
Target
Setup.exe
-
Size
6.9MB
-
Sample
240930-sq6brssckp
-
MD5
79449b07369b46285e48375f771c996a
-
SHA1
21dbca3df86327b33176a7819132c12e11895700
-
SHA256
8c955a37a31e8ce5e6948ff860205ab894cef6e4ec834c426fb7c8c5e87946f8
-
SHA512
0588aa0fd61767a871ca9bc087ffc81aa51a00d6237b9475d0fb250f41cf7d33913e22ab775089af68580c4af2aea3b388efa9fa99e41bdda3228c9f06f9b62e
-
SSDEEP
98304:4BDjWM8JEE1r6GAamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIJ:4B0HBeNTfm/pf+xk4dWRptrbWOjgrA
Malware Config
Targets
-
-
Target
Setup.exe
-
Size
6.9MB
-
MD5
79449b07369b46285e48375f771c996a
-
SHA1
21dbca3df86327b33176a7819132c12e11895700
-
SHA256
8c955a37a31e8ce5e6948ff860205ab894cef6e4ec834c426fb7c8c5e87946f8
-
SHA512
0588aa0fd61767a871ca9bc087ffc81aa51a00d6237b9475d0fb250f41cf7d33913e22ab775089af68580c4af2aea3b388efa9fa99e41bdda3228c9f06f9b62e
-
SSDEEP
98304:4BDjWM8JEE1r6GAamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIJ:4B0HBeNTfm/pf+xk4dWRptrbWOjgrA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-