General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241002-arl1eaxhpj
-
MD5
cf216022d5e73c2231962cc415de203d
-
SHA1
3dd211b749d568f0858c8fc7926cf03cd30d86c5
-
SHA256
2b08f92f8f09ab5897837eaacc5f332bca81aebdfaaebf769f13de7b44079be2
-
SHA512
f18ebb8d0587942a0c65af7330908b687fd83431d0ba59b97a6e611ea5ab44b97249981e577997250239d5c9b5fd777a4e680d0afc38ef04809cd1e7f0297c50
-
SSDEEP
98304:xAEtdFBy3mamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R1BMyi23hs8By:xnFM/eN/FJMIDJf0gsAGK4R1uyYCy
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
cf216022d5e73c2231962cc415de203d
-
SHA1
3dd211b749d568f0858c8fc7926cf03cd30d86c5
-
SHA256
2b08f92f8f09ab5897837eaacc5f332bca81aebdfaaebf769f13de7b44079be2
-
SHA512
f18ebb8d0587942a0c65af7330908b687fd83431d0ba59b97a6e611ea5ab44b97249981e577997250239d5c9b5fd777a4e680d0afc38ef04809cd1e7f0297c50
-
SSDEEP
98304:xAEtdFBy3mamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R1BMyi23hs8By:xnFM/eN/FJMIDJf0gsAGK4R1uyYCy
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-