General
-
Target
2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f.exe
-
Size
5.9MB
-
Sample
241005-bhvfvs1cjh
-
MD5
e95c0515d1d3bf9c2a6e0b20ba1ebd98
-
SHA1
8ca53ae3b33df086bd12d7fb31ada294f699bf9d
-
SHA256
2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f
-
SHA512
06b0513e21321ec3bf28b9ca8a5ab422e458fdf9a997c05cb3b3eeed0ca75d8f0586c0836cdf0c2d30f73937bda20a580e5903cc35238c4bc50cbffbb41ac705
-
SSDEEP
98304:i97mDSuXXOgRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nQek:ihmDZ5RHvUWvozWOxu9kXwvdbDlA03NE
Behavioral task
behavioral1
Sample
2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f.exe
-
Size
5.9MB
-
MD5
e95c0515d1d3bf9c2a6e0b20ba1ebd98
-
SHA1
8ca53ae3b33df086bd12d7fb31ada294f699bf9d
-
SHA256
2664862a4f87e91f92f17a26e6d0b0505db5a92720f2d7eb703e0f55a88eec3f
-
SHA512
06b0513e21321ec3bf28b9ca8a5ab422e458fdf9a997c05cb3b3eeed0ca75d8f0586c0836cdf0c2d30f73937bda20a580e5903cc35238c4bc50cbffbb41ac705
-
SSDEEP
98304:i97mDSuXXOgRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nQek:ihmDZ5RHvUWvozWOxu9kXwvdbDlA03NE
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-