General
-
Target
VMXware_Setup.exe
-
Size
129.0MB
-
Sample
241006-btwhastbnc
-
MD5
47c0f03d4c5a054cd2e237646b58337f
-
SHA1
eb67ae1fed1acbbdfa48d8b897077a4fa6ecbb86
-
SHA256
68596ed4ef872d6a0db297bb564b64afc4b6a6e48fa13aac7155c47a0a9ab951
-
SHA512
cc329978cc2bc30ab325c2f69ef558d3beebbb7156a63ca421158c65ad5c0ef054486a28df19e32780b33292440f7ea96da33337d9700805a152529e4f26bb50
-
SSDEEP
196608:OEgVVE/ywfI9jUC2gYBYv3vbW2+iITx1U6n2:yVVE/RIH2gYBgDWJTnz2
Behavioral task
behavioral1
Sample
VMXware_Setup.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
VMXware_Setup.exe
-
Size
129.0MB
-
MD5
47c0f03d4c5a054cd2e237646b58337f
-
SHA1
eb67ae1fed1acbbdfa48d8b897077a4fa6ecbb86
-
SHA256
68596ed4ef872d6a0db297bb564b64afc4b6a6e48fa13aac7155c47a0a9ab951
-
SHA512
cc329978cc2bc30ab325c2f69ef558d3beebbb7156a63ca421158c65ad5c0ef054486a28df19e32780b33292440f7ea96da33337d9700805a152529e4f26bb50
-
SSDEEP
196608:OEgVVE/ywfI9jUC2gYBYv3vbW2+iITx1U6n2:yVVE/RIH2gYBgDWJTnz2
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-