General
-
Target
PdiddySploit.exe
-
Size
103.6MB
-
Sample
241002-b6kassvdjg
-
MD5
698ae6ffbbf2651ba5cdf63293934402
-
SHA1
729db94b7c3e1696df1ea57c98a9878838d6f545
-
SHA256
b04a38a762d12d07e52e584608dc08ba16dc04c02f9e5b678faa01a479e96222
-
SHA512
37beeaaa9f608dc7045f22a6fba495ef099fccbc4351a6366d3a020e2118c43fb06e13ddf93477cb481f0ba90bea0e8ace2f7a3d81a5f4dd394b8ea0000ae5ab
-
SSDEEP
3145728:N/QL88S6xjKcBanL2qHO5iVjdqlnGQbRe0zJcBs39vGO3p:NCHSWNaBHCi651XcBs3/3
Behavioral task
behavioral1
Sample
PdiddySploit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PdiddySploit.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
PdiddySploit.exe
-
Size
103.6MB
-
MD5
698ae6ffbbf2651ba5cdf63293934402
-
SHA1
729db94b7c3e1696df1ea57c98a9878838d6f545
-
SHA256
b04a38a762d12d07e52e584608dc08ba16dc04c02f9e5b678faa01a479e96222
-
SHA512
37beeaaa9f608dc7045f22a6fba495ef099fccbc4351a6366d3a020e2118c43fb06e13ddf93477cb481f0ba90bea0e8ace2f7a3d81a5f4dd394b8ea0000ae5ab
-
SSDEEP
3145728:N/QL88S6xjKcBanL2qHO5iVjdqlnGQbRe0zJcBs39vGO3p:NCHSWNaBHCi651XcBs3/3
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-