General
-
Target
IMAGE LOGGER 3.5.exe
-
Size
10.0MB
-
Sample
241003-x3ndyawcjh
-
MD5
af94182d4d8780dcd463480fc9c4a489
-
SHA1
4cad9d5ca0f5da577928b11136572813d6435d6e
-
SHA256
929d5b596c6904da3809de08a43679c3ef5ab645dced22f644fec8f004c5c57e
-
SHA512
c16b9cd7201f0325033fbc8f4907ba6b8452090c16373bbe20066439e457b44214b6fe229820d875aa4e09f0995db33c27e0d5805ef7cd26b4d8026eab1e91ee
-
SSDEEP
196608:d18PvLjv+bhqNVoB0SEsucQZ41JBbIM11tU:n8PjL+9qz80SJHQK1Jx1vU
Behavioral task
behavioral1
Sample
IMAGE LOGGER 3.5.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
IMAGE LOGGER 3.5.exe
-
Size
10.0MB
-
MD5
af94182d4d8780dcd463480fc9c4a489
-
SHA1
4cad9d5ca0f5da577928b11136572813d6435d6e
-
SHA256
929d5b596c6904da3809de08a43679c3ef5ab645dced22f644fec8f004c5c57e
-
SHA512
c16b9cd7201f0325033fbc8f4907ba6b8452090c16373bbe20066439e457b44214b6fe229820d875aa4e09f0995db33c27e0d5805ef7cd26b4d8026eab1e91ee
-
SSDEEP
196608:d18PvLjv+bhqNVoB0SEsucQZ41JBbIM11tU:n8PjL+9qz80SJHQK1Jx1vU
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-