General
-
Target
79041d419f813d07403d5ea0e190c09f63c0e9339bcf225b4588388de34aaa88
-
Size
7.4MB
-
Sample
241006-lt2dnasamc
-
MD5
cd56d1639c638ef44a1cbcf6756ef2ba
-
SHA1
784970f33b026fe770d8c0f8938d17b26c428327
-
SHA256
79041d419f813d07403d5ea0e190c09f63c0e9339bcf225b4588388de34aaa88
-
SHA512
c00a3be6d4cbc672b4fe3b4afb5072832a870c99d795656380e23d33e9b7b45f2d0851ba86e1d35fe502af2d001cf13e13ff6d431349dc166cfbdcc54bb19b39
-
SSDEEP
196608:qw0cDemLjv+bhqNVoBKUh8mz4Iv9Pmu1D7wJo:SieaL+9qz8/b4IsuRmo
Behavioral task
behavioral1
Sample
79041d419f813d07403d5ea0e190c09f63c0e9339bcf225b4588388de34aaa88.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
79041d419f813d07403d5ea0e190c09f63c0e9339bcf225b4588388de34aaa88
-
Size
7.4MB
-
MD5
cd56d1639c638ef44a1cbcf6756ef2ba
-
SHA1
784970f33b026fe770d8c0f8938d17b26c428327
-
SHA256
79041d419f813d07403d5ea0e190c09f63c0e9339bcf225b4588388de34aaa88
-
SHA512
c00a3be6d4cbc672b4fe3b4afb5072832a870c99d795656380e23d33e9b7b45f2d0851ba86e1d35fe502af2d001cf13e13ff6d431349dc166cfbdcc54bb19b39
-
SSDEEP
196608:qw0cDemLjv+bhqNVoBKUh8mz4Iv9Pmu1D7wJo:SieaL+9qz8/b4IsuRmo
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-