General
-
Target
TZ.exe
-
Size
7.4MB
-
Sample
241002-wmh9lszbjq
-
MD5
0942cffb3efa3b68394e7c1d626ed63f
-
SHA1
6bf1bd02cdbf6bdb6ed6a8021d6b19541171eedd
-
SHA256
6444e46a6ddec80d96604c170a0eaa9ae30605432c10895101a8fd6fdf7de373
-
SHA512
6cac769bf2c1e2798f7fdecc740237ec219d5af4ab51921b6a3c7ed5993cb3398dceceddbf8947a975762381d29e6ab38ec49ddc179fe037e500812cd81e8c96
-
SSDEEP
98304:JpaMc+nEurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMq:nvnEurErvI9pWjgyvoaYrE41JIuICoxp
Malware Config
Targets
-
-
Target
TZ.exe
-
Size
7.4MB
-
MD5
0942cffb3efa3b68394e7c1d626ed63f
-
SHA1
6bf1bd02cdbf6bdb6ed6a8021d6b19541171eedd
-
SHA256
6444e46a6ddec80d96604c170a0eaa9ae30605432c10895101a8fd6fdf7de373
-
SHA512
6cac769bf2c1e2798f7fdecc740237ec219d5af4ab51921b6a3c7ed5993cb3398dceceddbf8947a975762381d29e6ab38ec49ddc179fe037e500812cd81e8c96
-
SSDEEP
98304:JpaMc+nEurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMq:nvnEurErvI9pWjgyvoaYrE41JIuICoxp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-