General
-
Target
grzegorzrat.exe
-
Size
6.6MB
-
Sample
241006-k512la1cmc
-
MD5
fcfd2b39a40230801b219516842e1c27
-
SHA1
87e59e6df45a844efd2462acc24afcde3111e294
-
SHA256
2cba71e81382f66fdf71dca320a7fd413c4007a42a894df8c9b91f2f68d53853
-
SHA512
ff5e8b26493f61de2b79dc4c5b84886d513742574f85799fc8b74f6d79681ab8930a629c17471d2c2edcd3e5a485f0d8438f6489c61b2fd8ee154fb97e0c54de
-
SSDEEP
196608:F5FPweN/FJMIDJf0gsAGKXa1R9uAKpM4H:V/Fqyf0gsvEAKl
Behavioral task
behavioral1
Sample
grzegorzrat.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
grzegorzrat.exe
-
Size
6.6MB
-
MD5
fcfd2b39a40230801b219516842e1c27
-
SHA1
87e59e6df45a844efd2462acc24afcde3111e294
-
SHA256
2cba71e81382f66fdf71dca320a7fd413c4007a42a894df8c9b91f2f68d53853
-
SHA512
ff5e8b26493f61de2b79dc4c5b84886d513742574f85799fc8b74f6d79681ab8930a629c17471d2c2edcd3e5a485f0d8438f6489c61b2fd8ee154fb97e0c54de
-
SSDEEP
196608:F5FPweN/FJMIDJf0gsAGKXa1R9uAKpM4H:V/Fqyf0gsvEAKl
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-