General
-
Target
Loader.exe
-
Size
7.5MB
-
Sample
241005-ctjn6sthme
-
MD5
8f2b009d265cf435f3eacff4f217e2e4
-
SHA1
c5f228932332f5823c92977b22308b4429ed95ac
-
SHA256
824b514ab771e1faf23f3c33c3450d607e0750bbf8f1cc1143cbb775e991bec3
-
SHA512
074e8dc888e3d514a63c6cb15816c8c34953c24ea33d589a73e48499fbd18904f3b43a8ed33b6d52d6935e202414c5cc041fd817244ae5e9e5c0e1d37a9703e4
-
SSDEEP
196608:GMgVVEawfI9jUC2gYBYv3vbW2+iITx1U6nq:8VVEJIH2gYBgDWJTnzq
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.5MB
-
MD5
8f2b009d265cf435f3eacff4f217e2e4
-
SHA1
c5f228932332f5823c92977b22308b4429ed95ac
-
SHA256
824b514ab771e1faf23f3c33c3450d607e0750bbf8f1cc1143cbb775e991bec3
-
SHA512
074e8dc888e3d514a63c6cb15816c8c34953c24ea33d589a73e48499fbd18904f3b43a8ed33b6d52d6935e202414c5cc041fd817244ae5e9e5c0e1d37a9703e4
-
SSDEEP
196608:GMgVVEawfI9jUC2gYBYv3vbW2+iITx1U6nq:8VVEJIH2gYBgDWJTnzq
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-