General
-
Target
avix spoofer.exe
-
Size
7.5MB
-
Sample
241006-cpsraazdnm
-
MD5
07426f58c34ccec8fd28f9a401699f08
-
SHA1
b85a8f5961ea5b31917c118a7499b9304c08394e
-
SHA256
d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f
-
SHA512
4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3
-
SSDEEP
196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK
Behavioral task
behavioral1
Sample
avix spoofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
avix spoofer.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
����H�E.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
����H�E.pyc
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
avix spoofer.exe
-
Size
7.5MB
-
MD5
07426f58c34ccec8fd28f9a401699f08
-
SHA1
b85a8f5961ea5b31917c118a7499b9304c08394e
-
SHA256
d809964d6bd28ddefedc2ed41a64e768b2e77752ba729bae47ec6cc67dcee07f
-
SHA512
4a7d00e0fd2c78b12435e6636a5a47256b961cdde31c453823abce94893afdab12e072fc4ded7b2971a8a28a4c2cccb69acae3d860ab86345830d892788816d3
-
SSDEEP
196608:B9gVVEJTwfI9jUC2gYBYv3vbW2+iITx1U6nK:UVVEJgIH2gYBgDWJTnzK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
����H�E.pyc
-
Size
1KB
-
MD5
9e0cf364f3f76ac1fb89782c4f374441
-
SHA1
6bb01909c3ff490cd4d400ba17053bd53825c32e
-
SHA256
5dcba2201720fa88372aa9315badc48359883c25a3ab961e649629fb52af3966
-
SHA512
b20625311ac3b04b52260e4a737e4c2e2a42b972e6201f1abbbdd38410009516323c42656d5a388a11a044686183da39f6498d5ba5353b3d6820ca75a882bd80
Score1/10 -