General
-
Target
PIXITCH.EXE1 PAID.exe
-
Size
10.0MB
-
Sample
241004-ypfbvaxgpe
-
MD5
b747659444753d6e13760c1570b463a5
-
SHA1
7b22b21fb17174871a35aae82f60415da2be1ae8
-
SHA256
11e9a38f9de76466dd77fb93054b5ff33e25893e4fd1ccfdf6d36386b1dcc1f4
-
SHA512
ce3552de9916c23246c524a0e02a09d132d5b7d0d7fb263c280817d46a4491f4ca0a6e1e36e0a71ec83eec4e12e57965a8126f358fb3385cbc8d58bae1270116
-
SSDEEP
196608:L7FboeN/FJMIDJf0gsAGK5SEQRWuAKZybt:N/Fqyf0gsfNRAKk
Behavioral task
behavioral1
Sample
PIXITCH.EXE1 PAID.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
PIXITCH.EXE1 PAID.exe
-
Size
10.0MB
-
MD5
b747659444753d6e13760c1570b463a5
-
SHA1
7b22b21fb17174871a35aae82f60415da2be1ae8
-
SHA256
11e9a38f9de76466dd77fb93054b5ff33e25893e4fd1ccfdf6d36386b1dcc1f4
-
SHA512
ce3552de9916c23246c524a0e02a09d132d5b7d0d7fb263c280817d46a4491f4ca0a6e1e36e0a71ec83eec4e12e57965a8126f358fb3385cbc8d58bae1270116
-
SSDEEP
196608:L7FboeN/FJMIDJf0gsAGK5SEQRWuAKZybt:N/Fqyf0gsfNRAKk
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-